This report summarizes the research activities completed in task T3.4 (Research and identification of advanced confidentiality methods) in order to provide best practices for supporting software development in T3.5 (Reference Implementaton of Advanced Confidentiality Methods) [1].
In this deliverable, we documented the development research achievements regarding the PharmaLedger blockchain platform and many of the activities required to modify and improve the prerequisite blockchain technologies used to build the PharmaLedger platform. During this task, while implementing the platform, a series of challenges were identified and documented. In addition, innovations regarding smart contracts execution and changes regarding deployment of the blockchain platform were proposed. We believe that the implementation of the use cases will generate further suggestions for improvements.
Development and research continues and provides further input for the prerequisite blockchain technologies used to build the PharmaLedger platform.
PharmaLedger – First Report of Engagement of Regulatory and Standardization S...PharmaLedger
The D6.8 PharmaLedger First Report of Engagement of Regulatory and Standardization Strategy deliverable establishes and documents a plan for the regulatory and standardization approach and strategy for the PharmaLedger project.
Through this deliverable, the PharmaLedger project seeks to understand its stakeholders’ opinions and concerns, and to involve them early in the project buildout. Therefore, this report describes the purpose for engagement with stakeholders, exemplifies its goals and output through its different use cases, stresses the importance of sound coordination between the use cases as well as the value of combining or consolidating various interactions, and defines priority areas for a sound and strategic engagement approach. It identifies which stakeholders are relevant and indicates their importance to the project. It reports on how the project has engaged with relevant stakeholders up until now and lists the upcoming activities. Finally, this document outlines the timeframe that is required to achieve the set ambitions.
PharmaLedger Ethical and Legal InventoryPharmaLedger
The D5.1 PharmaLedger Ethical and Legal Inventory deliverable sets up the legal framework for the PharmaLedger project and presents the legal and ethical requirements to be applied in the design and execution of the platform. This document serves as a background for WP5 to perform the upcoming detailed ethical and legal study following the terms and conditions from the Grant Agreement.
As the goal of the PharmaLedger project is to provide a widely trusted platform that supports the design and adoption of blockchain-enabled healthcare solutions while accelerating the delivery of innovation that benefits the entire ecosystem, from manufacturers to patients, the project is operating in saturated and highly regulated markets. Therefore, it is critical to identify the legal challenges in the early stage of designing the platform. To that end, this document serves two purposes: i) setting up the legal and ethical framework that applies to PharmaLedger and identifying the legal and ethical requirements for which compliance is mandatory; ii) raising awareness, especially about key standing items on every IT developer’s risk agenda – privacy and data security.
This document is organised across three key themes: privacy and data protection, clinical trials, and the pharmaceutical supply chain. It provides high-level guidance on ethics and the laws and regulations on privacy, data protection, security, confidentiality, clinical trials, drug development, manufacturing, and distribution. As PharmaLedger is sponsored by the Innovative Medicines Initiative (IMI) and the European Federation of Pharmaceutical Industries and Associations (EFPIA) under the European Union’s Horizon 2020 programme, the legal framework in this deliverable is limited to the laws, regulations, and other normative acts applicable on the EU/EEA territory. Compliance issues must always be considered on a country-by-country basis due to many aspects being regulated only at the national level – an analysis that requires extensive knowledge of the specific country’s legislative processes and the official language of that country. Therefore, this document should by no means be interpreted as an exhaustive elaboration of the applicable regulatory and legal requirements.
PharmaLedger – Healthcare industry digitization & engagement guidelines throu...PharmaLedger
The objective of this Report is to describe the 1st iteration of the Healthcare industry digitization & engagement guidelines through Collaboration Platform and the key elements and components which enable it to fulfil the brief as specified in Task 6.2. This is an iterative development process to ensure a goal-oriented development process aligned with users’ needs and requirements.
The requirements and activities related to this task are linked and aligned with WP2.5 deliverable D2.5 “Reference Domain Applications Use Cases Implementation, Validation and Piloting”. The work described within the report specifically related to the implementation of the GDPR is linked to WP5, delivery 5.1: PharmaLedger Ethical and Legal Inventory.
The results of this deliverable is a 1st iteration (or Alpha version) of the Collaboration Platform that includes the identification of User Types, the functional specification of the core elements of the platform, GDPR and Privacy arrangements, Training, Sandbox testing/development and Feedback mechanisms. The plan is to launch this version of the Collaboration Platform in M18 and engage stakeholders.
PharmaLedger – Dissemination and In-Project Exploitation PlanPharmaLedger
This document provides an overview of the PharmaLedger dissemination and exploitation strategy, drawn up according to a 36-month plan (January 2020-December 2022), to be reviewed yearly, to ensure the maximum project visibility, transparency, awareness raising on the targeted communities and exploitation of results through the project life cycle.
The PharmaLedger dissemination and exploitation strategy is based on the following principles:
• The objectives of the dissemination and exploitation will support three perspectives, (1) Project Focus, (2) Engagement Focus, and (3) Result-driven Focus.
• Each dissemination pillar will be supported by five components: WHY (ensuring awareness of the project), WHO (target audiences), WHAT (Key messages of project assets), HOW (communication channels) and WHEN (implementation and time planner).
• The dissemination activities will be conceived as knowledge sharing of the eight prioritised use cases in three Domain Reference Applications (DRAs), supporting and raising awareness about all PharmaLedger’s activities and results.
• Establish collaboration with related national, international and EU funded projects and initiatives.
• Publish PharmaLedger results and tools/services related to the blockchain enabled healthcare system in relevant national and international scientific journals addressing the pharmaceuticals, healthcare, and IT communities.
• Organise focused networking events such as workshops etc. However, due to the Covid-19 pandemic physical workshops will be replaced by virtual sessions and webcasts.
• Participate in external events and conferences (virtual during pandemic) in Healthcare, Pharmaceuticals, ICT etc., produce press releases, brochures, and posters.
PharmaLedger – The collaboration Platform (1st Iteration Report)PharmaLedger
The purpose of this delivery report is to describe the first iteration development of the Collaboration Platform, based on the Dynamic Knowledge Management (DKM) platform, customized as the engagement platform of the PharmaLedger project.
The requirements and customization activities performed in this task are linked with WP6, Task 6.2, Engagement through the collaboration platform. An iterative development process to ensure a goal-oriented development process aligned with users’ needs and requirements. The implementation of the GDPR is linked to WP5, delivery 5.1: PharmaLedger Ethical and Legal Inventory.
This deliverable summarises the development performed in Task 2.5 (WP2), which aim at customizing and building the Collaboration Platform meeting targeted users’ needs.
The results of this deliverable, WP2, Task 2.5, is a functional customized alpha version of the Collaboration Platform, iteration I. The alpha version of the Collaboration Platform, iteration I, includes setting up the overall infrastructure, UX improvements ensuring of responsive user experience, development of FEED containing user posts, capability to host iframes in pages (additional page-elements) and 3rd party JSON sources display, documented API layer, and working with MongoDB on the cloud. We are also developing user privacy and the right to erasure, as defined by the GDPR.
We plan to launch this version of the Collaboration Platform in M18 and engage patients, HCP groups and content managed by EFGCP/EPF. Also, this version will support working groups related to the PharmaLedger Project, subject to NDAs. We elaborated the user engagement in delivery 6.4: Healthcare industry digitization & engagement guidelines through collaboration platform.
PharmaLedger – In-depth Ethical and Legal StudyPharmaLedger
This deliverable is an in-depth legal and ethical study of PharmaLedger, and it should be read in conjunction with the D5.1 Ethical and Legal Inventory deliverable. The document is primarily addressed to the developers of the PharmaLedger platform and its solutions as guidance material to promote compliance with the applicable legal and ethical principles.
PharmaLedger intends to provide a blockchain-enabled platform that promotes the creation and implementation of trusted and privacy-enabled healthcare solutions, while also expediting the delivery of innovation that benefits the whole ecosystem, from manufacturers to patients. Legal concerns are often seen as risks that can obstruct the creation and deployment of blockchains in highly regulated industries like healthcare. Compliance with existing and upcoming standards and laws is therefore critical for the PharmaLedger platform to be widely accepted by the ecosystem. The primary purpose of this deliverable is to provide a detailed ethical and legal analysis of the applicable norms in the three domains where PharmaLedger solutions are planned to be deployed: pharmaceutical supply chain, clinical trials, and health data.
The principal theme of this deliverable centres on the importance of ensuring that the privacy and data protection standards as set by the GDPR are upheld in the technical design and deployment of the PharmaLedger platform and its use cases. The fundamentals of safeguarding personal data and accountability for compliance with the legal requirements are presented throughout the document. Furthermore, this deliverable examines the legal and ethical challenges and opportunities presented by blockchain for electronic consenting and remote monitoring of patients via IoT devices. Legal and ethical implications of exploiting blockchain’s potential for delivering electronic product information, finished goods traceability, and anti-counterfeiting measures are also discussed.
This document describes the initial architecture of PharmaLedger, an open blockchain platform for the healthcare industry. The key elements of the architecture include:
- A hierarchical blockchain structure with independent blockchains dedicated to specific use cases and functions.
- The use of Data Sharing Units (DSUs) to encapsulate self-sovereign code and data, with an emphasis on implementing applications and wallets in DSUs.
- Standard APIs, libraries and tools to simplify application development on PharmaLedger.
- Security, privacy and confidentiality built into the architecture through the use of DSUs, client-side encryption and user wallets.
- Flexibility and future-proofing through replacing underlying
PharmaLedger – Requirement document report for governance applicationPharmaLedger
This document provides requirements for PharmaLedger governance automation tools. The requirements emerged from prior work on PharmaLedger governance recommendations and other governance definition activities of the PharmaLedger project.
As PharmaLedger governance emerged as a highly complex topic that has organizational, business network, blockchain platform and use case aspects. Some of the PharmaLedger governance activities will be based on management by people through direct interpersonal communication (“human governance” as opposed to “automated governance”). Such activities were identified and placed outside the scope of this document, as they can be performed using commercial communication, remote meeting and project management tools.
Among other things, this document identifies governance areas that merit dedicated automation tools. Such areas include opinion polling, voting on structured and generic unstructured proposals, blockchain network management (including intra-organizational and shared inter-organizational blockchains) and use case specific decision making.
The requirements contained by this document are for tools that will assist, automate or semi-automate governance of PharmaLedger organization, business network, blockchain platform and use case applications. Since the implementation of use cases is not mature at the time of submission of this document, some of the use case governance requirements will be provided at a later stage of the project.
Further work on definition of governance automation features is expected to take place in an interactive fashion, based on the initial implementation of the PharmaLedger Governance Application (PLGapp) based on the present recommendation, followed by agile iterations involving end users.
PharmaLedger – First Report of Engagement of Regulatory and Standardization S...PharmaLedger
The D6.8 PharmaLedger First Report of Engagement of Regulatory and Standardization Strategy deliverable establishes and documents a plan for the regulatory and standardization approach and strategy for the PharmaLedger project.
Through this deliverable, the PharmaLedger project seeks to understand its stakeholders’ opinions and concerns, and to involve them early in the project buildout. Therefore, this report describes the purpose for engagement with stakeholders, exemplifies its goals and output through its different use cases, stresses the importance of sound coordination between the use cases as well as the value of combining or consolidating various interactions, and defines priority areas for a sound and strategic engagement approach. It identifies which stakeholders are relevant and indicates their importance to the project. It reports on how the project has engaged with relevant stakeholders up until now and lists the upcoming activities. Finally, this document outlines the timeframe that is required to achieve the set ambitions.
PharmaLedger Ethical and Legal InventoryPharmaLedger
The D5.1 PharmaLedger Ethical and Legal Inventory deliverable sets up the legal framework for the PharmaLedger project and presents the legal and ethical requirements to be applied in the design and execution of the platform. This document serves as a background for WP5 to perform the upcoming detailed ethical and legal study following the terms and conditions from the Grant Agreement.
As the goal of the PharmaLedger project is to provide a widely trusted platform that supports the design and adoption of blockchain-enabled healthcare solutions while accelerating the delivery of innovation that benefits the entire ecosystem, from manufacturers to patients, the project is operating in saturated and highly regulated markets. Therefore, it is critical to identify the legal challenges in the early stage of designing the platform. To that end, this document serves two purposes: i) setting up the legal and ethical framework that applies to PharmaLedger and identifying the legal and ethical requirements for which compliance is mandatory; ii) raising awareness, especially about key standing items on every IT developer’s risk agenda – privacy and data security.
This document is organised across three key themes: privacy and data protection, clinical trials, and the pharmaceutical supply chain. It provides high-level guidance on ethics and the laws and regulations on privacy, data protection, security, confidentiality, clinical trials, drug development, manufacturing, and distribution. As PharmaLedger is sponsored by the Innovative Medicines Initiative (IMI) and the European Federation of Pharmaceutical Industries and Associations (EFPIA) under the European Union’s Horizon 2020 programme, the legal framework in this deliverable is limited to the laws, regulations, and other normative acts applicable on the EU/EEA territory. Compliance issues must always be considered on a country-by-country basis due to many aspects being regulated only at the national level – an analysis that requires extensive knowledge of the specific country’s legislative processes and the official language of that country. Therefore, this document should by no means be interpreted as an exhaustive elaboration of the applicable regulatory and legal requirements.
PharmaLedger – Healthcare industry digitization & engagement guidelines throu...PharmaLedger
The objective of this Report is to describe the 1st iteration of the Healthcare industry digitization & engagement guidelines through Collaboration Platform and the key elements and components which enable it to fulfil the brief as specified in Task 6.2. This is an iterative development process to ensure a goal-oriented development process aligned with users’ needs and requirements.
The requirements and activities related to this task are linked and aligned with WP2.5 deliverable D2.5 “Reference Domain Applications Use Cases Implementation, Validation and Piloting”. The work described within the report specifically related to the implementation of the GDPR is linked to WP5, delivery 5.1: PharmaLedger Ethical and Legal Inventory.
The results of this deliverable is a 1st iteration (or Alpha version) of the Collaboration Platform that includes the identification of User Types, the functional specification of the core elements of the platform, GDPR and Privacy arrangements, Training, Sandbox testing/development and Feedback mechanisms. The plan is to launch this version of the Collaboration Platform in M18 and engage stakeholders.
PharmaLedger – Dissemination and In-Project Exploitation PlanPharmaLedger
This document provides an overview of the PharmaLedger dissemination and exploitation strategy, drawn up according to a 36-month plan (January 2020-December 2022), to be reviewed yearly, to ensure the maximum project visibility, transparency, awareness raising on the targeted communities and exploitation of results through the project life cycle.
The PharmaLedger dissemination and exploitation strategy is based on the following principles:
• The objectives of the dissemination and exploitation will support three perspectives, (1) Project Focus, (2) Engagement Focus, and (3) Result-driven Focus.
• Each dissemination pillar will be supported by five components: WHY (ensuring awareness of the project), WHO (target audiences), WHAT (Key messages of project assets), HOW (communication channels) and WHEN (implementation and time planner).
• The dissemination activities will be conceived as knowledge sharing of the eight prioritised use cases in three Domain Reference Applications (DRAs), supporting and raising awareness about all PharmaLedger’s activities and results.
• Establish collaboration with related national, international and EU funded projects and initiatives.
• Publish PharmaLedger results and tools/services related to the blockchain enabled healthcare system in relevant national and international scientific journals addressing the pharmaceuticals, healthcare, and IT communities.
• Organise focused networking events such as workshops etc. However, due to the Covid-19 pandemic physical workshops will be replaced by virtual sessions and webcasts.
• Participate in external events and conferences (virtual during pandemic) in Healthcare, Pharmaceuticals, ICT etc., produce press releases, brochures, and posters.
PharmaLedger – The collaboration Platform (1st Iteration Report)PharmaLedger
The purpose of this delivery report is to describe the first iteration development of the Collaboration Platform, based on the Dynamic Knowledge Management (DKM) platform, customized as the engagement platform of the PharmaLedger project.
The requirements and customization activities performed in this task are linked with WP6, Task 6.2, Engagement through the collaboration platform. An iterative development process to ensure a goal-oriented development process aligned with users’ needs and requirements. The implementation of the GDPR is linked to WP5, delivery 5.1: PharmaLedger Ethical and Legal Inventory.
This deliverable summarises the development performed in Task 2.5 (WP2), which aim at customizing and building the Collaboration Platform meeting targeted users’ needs.
The results of this deliverable, WP2, Task 2.5, is a functional customized alpha version of the Collaboration Platform, iteration I. The alpha version of the Collaboration Platform, iteration I, includes setting up the overall infrastructure, UX improvements ensuring of responsive user experience, development of FEED containing user posts, capability to host iframes in pages (additional page-elements) and 3rd party JSON sources display, documented API layer, and working with MongoDB on the cloud. We are also developing user privacy and the right to erasure, as defined by the GDPR.
We plan to launch this version of the Collaboration Platform in M18 and engage patients, HCP groups and content managed by EFGCP/EPF. Also, this version will support working groups related to the PharmaLedger Project, subject to NDAs. We elaborated the user engagement in delivery 6.4: Healthcare industry digitization & engagement guidelines through collaboration platform.
PharmaLedger – In-depth Ethical and Legal StudyPharmaLedger
This deliverable is an in-depth legal and ethical study of PharmaLedger, and it should be read in conjunction with the D5.1 Ethical and Legal Inventory deliverable. The document is primarily addressed to the developers of the PharmaLedger platform and its solutions as guidance material to promote compliance with the applicable legal and ethical principles.
PharmaLedger intends to provide a blockchain-enabled platform that promotes the creation and implementation of trusted and privacy-enabled healthcare solutions, while also expediting the delivery of innovation that benefits the whole ecosystem, from manufacturers to patients. Legal concerns are often seen as risks that can obstruct the creation and deployment of blockchains in highly regulated industries like healthcare. Compliance with existing and upcoming standards and laws is therefore critical for the PharmaLedger platform to be widely accepted by the ecosystem. The primary purpose of this deliverable is to provide a detailed ethical and legal analysis of the applicable norms in the three domains where PharmaLedger solutions are planned to be deployed: pharmaceutical supply chain, clinical trials, and health data.
The principal theme of this deliverable centres on the importance of ensuring that the privacy and data protection standards as set by the GDPR are upheld in the technical design and deployment of the PharmaLedger platform and its use cases. The fundamentals of safeguarding personal data and accountability for compliance with the legal requirements are presented throughout the document. Furthermore, this deliverable examines the legal and ethical challenges and opportunities presented by blockchain for electronic consenting and remote monitoring of patients via IoT devices. Legal and ethical implications of exploiting blockchain’s potential for delivering electronic product information, finished goods traceability, and anti-counterfeiting measures are also discussed.
This document describes the initial architecture of PharmaLedger, an open blockchain platform for the healthcare industry. The key elements of the architecture include:
- A hierarchical blockchain structure with independent blockchains dedicated to specific use cases and functions.
- The use of Data Sharing Units (DSUs) to encapsulate self-sovereign code and data, with an emphasis on implementing applications and wallets in DSUs.
- Standard APIs, libraries and tools to simplify application development on PharmaLedger.
- Security, privacy and confidentiality built into the architecture through the use of DSUs, client-side encryption and user wallets.
- Flexibility and future-proofing through replacing underlying
PharmaLedger – Requirement document report for governance applicationPharmaLedger
This document provides requirements for PharmaLedger governance automation tools. The requirements emerged from prior work on PharmaLedger governance recommendations and other governance definition activities of the PharmaLedger project.
As PharmaLedger governance emerged as a highly complex topic that has organizational, business network, blockchain platform and use case aspects. Some of the PharmaLedger governance activities will be based on management by people through direct interpersonal communication (“human governance” as opposed to “automated governance”). Such activities were identified and placed outside the scope of this document, as they can be performed using commercial communication, remote meeting and project management tools.
Among other things, this document identifies governance areas that merit dedicated automation tools. Such areas include opinion polling, voting on structured and generic unstructured proposals, blockchain network management (including intra-organizational and shared inter-organizational blockchains) and use case specific decision making.
The requirements contained by this document are for tools that will assist, automate or semi-automate governance of PharmaLedger organization, business network, blockchain platform and use case applications. Since the implementation of use cases is not mature at the time of submission of this document, some of the use case governance requirements will be provided at a later stage of the project.
Further work on definition of governance automation features is expected to take place in an interactive fashion, based on the initial implementation of the PharmaLedger Governance Application (PLGapp) based on the present recommendation, followed by agile iterations involving end users.
First reference implementation of PharmaLedger governance UIPharmaLedger
The document describes the first reference implementation of the user interface for the PharmaLedger Governance tool. The UI is organized around two main dashboards - a Voting dashboard and a Deployment Automation dashboard. The Voting dashboard allows users to view existing voting sessions, initiate new sessions of different types, and view results. The Deployment Automation dashboard provides functions for technical management of blockchain networks, including their initiation, deployment, monitoring and removal. The Governance tool is implemented as a self-sovereign application using decentralized identifiers for security and authentication.
PharmaLedger – First Report on Dissemination and Exploitation ActivitiesPharmaLedger
This deliverable describes all dissemination and exploitation activities we (PharmaLedger Consortium) conducted from Month 1 to Month 18 (January 2020 – June 2021). D6.12 complements the deliverable D6.11 Dissemination and in-project exploitation plan (M6), which describes PharmaLedger’s Dissemination, communication, and exploitation strategy to maximise the project impacts.
We have divided this document into three main sections; the first two provides a detailed description of the dissemination activities and next planned dissemination, and the third presents the updated exploitation plan and activities.
Due to the Covid-19, we have mostly relied on the virtual dissemination activities. This increased PharmaLedger’s opportunity to present in the international and multidisciplinary events.
PharmaLedger project has achieved, during the last 18 months, a relevant acknowledgement and a relevant position in the healthcare ecosystem and blockchain/digital technologies due to the awareness events, the use case definitions, and research carried out during the project. Furthermore, the project's impact has been raised due to the development of the blockchain-based platform, focused on the use cases in three Domain Reference Applications (DRAs): Supply Chain, Clinical Trials
and Health Data, which is in the process of implementation. Keeping in mind the achievements developed by the project, the PharmaLedger consortium has executed the dissemination and exploitation activities to maximise impact and expose the project results.
During the first half of the project, the dissemination and communication activities have focused on presenting and demonstrating the use cases developed in the three DRAs at different events and conferences (such as DIA Europe, European Blockchain Congress, LogiPharma, Scope, etc.). Furthermore, regarding the exploitation activities during the first 18 months, the partners are coordinating with other European projects and regulatory and standardisation bodies and continuing the groundwork on the post-project governance and operating model (WP4).
PharmaLedger – Blockchain platform modifications and interoperabilityPharmaLedger
The purpose of this deliverable, D3.4 Blockchain platform modifications and interoperability, is to describe the change performed in the platform to meet the challenges in the PharmaLedger project, with its interoperability needs. It includes all the activities required to modify and improve the prerequisite blockchain technologies used to build the PharmaLedger platform.
This deliverable is related to concepts and technologies explained deliverables:
• D3.1: PharmaLedger Framework Architecture for Healthcare Industry -1st Iteration [1]
• D3.3: Blockchain platform research [2]
• D3.10: First Reference Implementation of PharmaLedger platform [3]
Based on research and the use case implementations, this deliverable improved the prerequisite blockchain technologies used by the PharmaLedger platform.
We structure this deliverable as follows:
• Introduction to blockchain layers and the OpenDSU APIHub components
• Describe the Platform modifications and interoperability
• Describe the OpenDSU modifications
• Describe the new emerged requirements while implementing PharmaLedger Platform
• Architecture improvements related to smart contracts
• Describe the deployment of the blockchain platform
We concluded this deliverable by elaborating on the next steps of the blockchain platform development.
PharmaLedger – Use case prioritization and selection for deploymentPharmaLedger
This report presents results from T1.1, which provides the use case nomination, selection and prioritization of the use cases.
A methodology with a standardized criteria has been defined for nominating and evaluating the use cases; overall over 88 use cases were nominated having 2 phases for filtering and assessing the use cases regarding value, feasibility and suitability; as well as the value generated by using blockchain.
As a result: 8 use cases have been selected as the main representatives of the three PharmaLedger Domains: supply chain, heath data and clinical trials; with an additional “key enabler” use case (Dynamic Consent) that ensures that patient consent is also provided as a main piece when the patient privacy and consenting of sharing of data is needed to be approached. The eight use cases selected are the following:
• DRA1: Supply Chain: eLeaflet/ eProduct Information (ePI); Clinical Supply Chain (CSC), Finished Goods end to end Traceability, Supply chain, and AntiCounterfeiting.
• DRA2: Health Data: IoT medical devices and Personalized Medicine; and additional key enabler (module) to support dynamic ePermissioning (dynamic consent for informed consent)
• DRA3: Clinical Trial: eConsent, Clinical Trial Recruitment
First Report on PharmaLedger Workshops and EventsPharmaLedger
The objective of this document is to provide the 1st report of the PharmaLedger Workshops, Events and the key activities engaged in, and achieved, to end of M18.
The report focuses on the design and delivery of a series of webinars to support the Co-Creation Workshops which became the only method of achieving the aims of dissemination and communication possible during the global COVID-19 pandemic.
The report examines the steps and elements which were factors in the successful delivery of the webinar series including the overall strategy, the format for the webinars, the workflow required to deliver the webinars on time, the method of delivery and the feedback mechanisms put in place to identify improvements and measure impact with audiences.
Recommendation for PharmaLedger governance, operating model and ConstitutionPharmaLedger
PharmaLedger is a project under the auspices of the Innovative Medicines Initiative (“IMI”). Like all projects, IMI PharmaLedger has a start and an end. The IMI PharmaLedger project will conclude in December 2022. For the solutions developed in PharmaLedger to continue to operate and evolve into the future, we must define a sustainable “post-PharmaLedger” governance and operating model. For the purpose of this report, we are referring to the current project as “IMI PharmaLedger” and the future, post-IMI business network as “NextGen PharmaLedger.”
This document builds on our previous work in researching governance and operation models (“D4.1 PharmaLedger Governance Options”). We provide a summary of the different governance options that we considered and make a recommendation for NextGen PharmaLedger’s future governance and operating model. In some cases there is not yet enough certainty about the scope, participants and scale of NextGen PharmaLedger to make a final recommendation. In those cases, we have narrowed the options to a smaller preferred set but have left a final recommendation until later in the project.
This report does not detail the implementation of its recommendations as those details will come later. Furthermore, it is assumed that the reader has a general familiarity with the governance of blockchain business networks and we do not provide exhaustive explanations of all details contained in this document.
Ethereum, Quorum, Hyperledger Fabric and Corda blockchains were studied based on a broad survey of literature, while focusing on major parameters that may affect their choice as building blocks in PharmaLedger’s hierarchical multi-blockchain architecture. Among other things, such parameters include governance, network and data structures, consensus protocol, transaction rate/throughput, security, modularity, ease of deployment, software engineering, costs and industrial adoption.
The results were put into a useful perspective for the PharmaLedger project by referencing and incorporating results achieved in the parallel Use Cases, Governance and Architecture research efforts.
The reported research is followed by a comprehensive comparative assessment of the blockchain technologies in this complex multi-parameter space. The comparison, along with the raw research data, is followed by conclusions and recommendations as to the potential use of the surveyed DLT technologies in the implementation of blockchain-based functionalities of PharmaLedger, to assist the designers of PharmaLedger platform and use cases in architectural and implementation decisions.
European Medicines Agency: Good Practice GuideBill Smith
This document provides a good practice guide on recording, coding, reporting and assessment of medication errors in the context of EU pharmacovigilance activities. It aims to clarify aspects related to medication errors to improve reporting and learning from errors. The guide defines key terms like adverse events and reactions, medication errors and their classification. It outlines legal requirements and provides recommendations on processes for recording, coding and reporting medication errors to competent authorities and in periodic safety reports. The roles and collaboration between various stakeholders in the EU regulatory network are also described.
This chapter discusses the benefits of using cable system diagnostics. It provides background on current asset management approaches, including the use of "bathtub curves" to model failure rates over time. The chapter then examines different cost elements involved in cable system lifecycles. It provides examples estimating the costs and benefits of commissioning tests and diagnostic programs. The estimates suggest diagnostics can reduce outage costs by identifying problems earlier. The chapter concludes that diagnostics allow more accurate forecasting and assessment of asset health, resource needs, and program efficacy compared to a "run to failure" approach.
NEETRAC (Chapter 8: Partial Discharge for HV and EHV Cable Systems)AHMED MOHAMED HEGAB
This document chapter discusses partial discharge (PD) testing for high voltage and extra high voltage power cable systems. It provides details on how PD testing works, how it is applied to cable systems, different sensor and measurement approaches, and considerations for commissioning and maintenance tests. The chapter aims to represent the current state of the art in PD testing for HV and EHV cables and identifies outstanding issues and areas for further development. It includes numerous figures and tables to illustrate concepts and provide recommendations for testing procedures and success criteria.
This chapter discusses monitored withstand techniques for cable systems. A monitored withstand test applies voltage above normal operating voltage for a set time while monitoring a property, such as tan δ, that correlates with cable condition. This allows utilities to make decisions during the test, such as ending the test early if data shows good performance or extending the test if data shows marginal performance. The chapter describes how monitored withstand tests work, how the data is applied, typical test frameworks, and issues that still need resolution. It provides details on monitored withstand using VLF tan δ and discusses criteria developed from research for evaluating test phases and amending test time.
This chapter discusses simple dielectric withstand testing techniques for cable systems. Simple withstand tests involve applying a continuous voltage above normal operating voltage for a set period of time. If the cable fails during the test, it is marked as not passing. The chapter covers how different voltages like DC, VLF and resonant AC are applied in simple withstand tests for MV, HV and EHV cables. It also discusses factors like test voltages, waveforms, success criteria and accuracy of results. The chapter analyzes various studies on simple withstand testing and how test parameters like frequency, voltage and time impact failure rates. It also provides perspectives on using simple withstand tests for diagnostic purposes and cable system maintenance.
This chapter discusses two techniques for assessing the condition of metallic shields in cables: time-domain reflectometry (TDR) and AC resistance (Ω-check). TDR uses reflected pulses to detect discontinuities or faults, while Ω-check measures resistance to evaluate shield integrity. The techniques are applied either online, with the cable in service, or offline. Outstanding issues are discussed, such as identifying far ends in TDR traces and the impact of joints/connectors on Ω-check measurements. Experimental work was conducted at NEETRAC to evaluate the accuracy and effectiveness of these assessment methods.
This document summarizes research on using dissipation factor (tan δ) testing to assess the condition of power cables. It describes how tan δ is measured, factors that affect its accuracy, criteria for evaluating results, and insights from analyzing a database of over 2,000 cable systems. Key findings include developing diagnostic levels based on combinations of tan δ features, observing differences between cable types, and improving assessments by increasing the data set size. The research aims to establish the most reliable approach for utilities to evaluate cable condition using tan δ testing.
This chapter discusses four other diagnostic techniques for cable condition assessment: dielectric spectroscopy, DC leakage current measurement, recovery voltage technique, and polarization/depolarization current technique. It provides details on how each technique works, how it is applied to cables, typical success criteria for interpreting results, considerations for accuracy, and outstanding issues still under research. The document is from a technical report on cable diagnostics published by Georgia Tech Research Corporation.
This chapter discusses time-domain reflectometry (TDR) for cable system diagnosis. TDR works by injecting a pulse into the cable and analyzing reflections to locate impedance discontinuities. Key factors in TDR testing include pulse amplitude, width, and injection method. TDR can detect faults, joints, taps, deteriorated neutrals, and water ingress. However, interpretation requires understanding how cable routing affects measured lengths and potential issues like "ghost" reflections. While useful, TDR also has limitations like requiring skilled operators and difficulty with some cable types or circuit configurations.
The document discusses issues with medium voltage cable systems. It provides historical context on the evolution of cable construction from the 1800s to present day. Key developments include the transition from paper to polymer insulation and the introduction of water tree resistant materials. The document also notes that while cable technology aimed to increase reliability, the process did not always achieve expected benefits, driving the need for cable system diagnostics. Failure rates of early cables are shown in graphs. Various tables outline the generations of cable construction and materials used over time.
This deliverable presents all the dissemination and communication material produced by the ANDROMEDA consortium within the second period of the project, i.e. September 2020 – July 2021. Particularly, it outlines the material created for the promotion of the first workshop (Sept. 2020) as well as the final one (Jun. 2021) of ANDROMEDA. Also, other materials created within the aforementioned period are described. It should be noted that the material produced within the first period of the project has been reported in deliverable D7.2 Initial Dissemination Materials.
D.7.3 is a public deliverable of this project, part of WP7 and additionally includes information about the project and a short description of WP7 in order to ensure that no prior knowledge related to the project, the DoA and the other WP7 deliverables is requested from the reader. Overall, it is based on, and is consistent with the DoA and the GA, but is not a substitute for reading these documents.
Lastly, it should be mentioned that the project has received a six-month extension of its lifecycle due to the COVID-19 impact on project’s activities and thus the submission date of this deliverable has been altered from M15 (Nov. 2020) as it was foreseen in DoA to M23 (Jul. 2021).
Project's Website: www.andromeda-project.eu
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 833881.
The current deliverable under the title “D7.2 Initial Dissemination Material” presents all the dissemination and communication material produced by the EFFECTOR consortium by M6 of project’s lifecycle, i.e. October 2020 – March 2021. Particularly, it outlines in detail the elements of the EFFECTOR visual identity (including the official EFFECTOR templates), the project’s printable dissemination materials (poster, leaflet, brochure) as well as the digital ones (the 1st newsletter issue, 1st press release, project’s overall presentation and other supportive digital material). Moreover, it lists the foreseen actions related to the creation of further dissemination materials from M7 to M18 (project’s completion).
D7.2 is a public deliverable of this project, part of WP7 and additionally includes information about the project's scope and objectives as well as the description of WP7 in order to ensure that no prior knowledge related to the project, the DoA and the other WP7 deliverables is requested from the reader. Overall, it is based on, and is consistent with the DoA and the GA, but is not a substitute for reading these documents.
Project's Website: www.effector-project.eu
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 883374.
The current deliverable reports the activities performed within Task 7.2 “Workshops Coordination” towards the organization of the second ANDROMEDA workshop that was held virtually on the 23rd June 2021. In conjunction with the workshop the consortium also organized online the Demonstration Event, the day after. These activities include the creation of both events’ programme (Agenda), the invitations sent to potential attendees, the digital promotional material created, the creation of the registration link and the information sheet for participation and data processing, the announcements made via the project’s website and social media for raising their visibility. Nevertheless, the core part of this document is dedicated in presenting the topics elaborated by the speakers, the discussions made and the results produced from both events.
Lastly, it should be noted that the ANDROMEDA project team decided to organize these events virtually as the vaccination programme across EU member states was under deployment and the risk for spreading the COVID-19 virus to partners, speakers and attendees was still valid.
Project's Website: www.andromeda-project.eu
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 833881.
The document provides an overview of the Open Virtualization Format Specification, which defines an open standard format for packaging and distributing virtual machines and their associated metadata. The format supports both single and multiple virtual machine configurations, is optimized for distribution and an automated user experience, and is extensible, vendor-independent, and localizable. Key elements of the format include the OVF package structure, OVF descriptor file, virtual hardware description, and core metadata sections.
This document provides a summary of the Oracle Database Performance Tuning Guide, which discusses how to optimize performance in Oracle Database. It covers topics such as performance planning, instance tuning, SQL tuning, and performance tools. The guide contains multiple parts that cover performance planning, optimizing instance performance, and automatic performance diagnostics. It describes features, tools, and methods for improving database performance.
First reference implementation of PharmaLedger governance UIPharmaLedger
The document describes the first reference implementation of the user interface for the PharmaLedger Governance tool. The UI is organized around two main dashboards - a Voting dashboard and a Deployment Automation dashboard. The Voting dashboard allows users to view existing voting sessions, initiate new sessions of different types, and view results. The Deployment Automation dashboard provides functions for technical management of blockchain networks, including their initiation, deployment, monitoring and removal. The Governance tool is implemented as a self-sovereign application using decentralized identifiers for security and authentication.
PharmaLedger – First Report on Dissemination and Exploitation ActivitiesPharmaLedger
This deliverable describes all dissemination and exploitation activities we (PharmaLedger Consortium) conducted from Month 1 to Month 18 (January 2020 – June 2021). D6.12 complements the deliverable D6.11 Dissemination and in-project exploitation plan (M6), which describes PharmaLedger’s Dissemination, communication, and exploitation strategy to maximise the project impacts.
We have divided this document into three main sections; the first two provides a detailed description of the dissemination activities and next planned dissemination, and the third presents the updated exploitation plan and activities.
Due to the Covid-19, we have mostly relied on the virtual dissemination activities. This increased PharmaLedger’s opportunity to present in the international and multidisciplinary events.
PharmaLedger project has achieved, during the last 18 months, a relevant acknowledgement and a relevant position in the healthcare ecosystem and blockchain/digital technologies due to the awareness events, the use case definitions, and research carried out during the project. Furthermore, the project's impact has been raised due to the development of the blockchain-based platform, focused on the use cases in three Domain Reference Applications (DRAs): Supply Chain, Clinical Trials
and Health Data, which is in the process of implementation. Keeping in mind the achievements developed by the project, the PharmaLedger consortium has executed the dissemination and exploitation activities to maximise impact and expose the project results.
During the first half of the project, the dissemination and communication activities have focused on presenting and demonstrating the use cases developed in the three DRAs at different events and conferences (such as DIA Europe, European Blockchain Congress, LogiPharma, Scope, etc.). Furthermore, regarding the exploitation activities during the first 18 months, the partners are coordinating with other European projects and regulatory and standardisation bodies and continuing the groundwork on the post-project governance and operating model (WP4).
PharmaLedger – Blockchain platform modifications and interoperabilityPharmaLedger
The purpose of this deliverable, D3.4 Blockchain platform modifications and interoperability, is to describe the change performed in the platform to meet the challenges in the PharmaLedger project, with its interoperability needs. It includes all the activities required to modify and improve the prerequisite blockchain technologies used to build the PharmaLedger platform.
This deliverable is related to concepts and technologies explained deliverables:
• D3.1: PharmaLedger Framework Architecture for Healthcare Industry -1st Iteration [1]
• D3.3: Blockchain platform research [2]
• D3.10: First Reference Implementation of PharmaLedger platform [3]
Based on research and the use case implementations, this deliverable improved the prerequisite blockchain technologies used by the PharmaLedger platform.
We structure this deliverable as follows:
• Introduction to blockchain layers and the OpenDSU APIHub components
• Describe the Platform modifications and interoperability
• Describe the OpenDSU modifications
• Describe the new emerged requirements while implementing PharmaLedger Platform
• Architecture improvements related to smart contracts
• Describe the deployment of the blockchain platform
We concluded this deliverable by elaborating on the next steps of the blockchain platform development.
PharmaLedger – Use case prioritization and selection for deploymentPharmaLedger
This report presents results from T1.1, which provides the use case nomination, selection and prioritization of the use cases.
A methodology with a standardized criteria has been defined for nominating and evaluating the use cases; overall over 88 use cases were nominated having 2 phases for filtering and assessing the use cases regarding value, feasibility and suitability; as well as the value generated by using blockchain.
As a result: 8 use cases have been selected as the main representatives of the three PharmaLedger Domains: supply chain, heath data and clinical trials; with an additional “key enabler” use case (Dynamic Consent) that ensures that patient consent is also provided as a main piece when the patient privacy and consenting of sharing of data is needed to be approached. The eight use cases selected are the following:
• DRA1: Supply Chain: eLeaflet/ eProduct Information (ePI); Clinical Supply Chain (CSC), Finished Goods end to end Traceability, Supply chain, and AntiCounterfeiting.
• DRA2: Health Data: IoT medical devices and Personalized Medicine; and additional key enabler (module) to support dynamic ePermissioning (dynamic consent for informed consent)
• DRA3: Clinical Trial: eConsent, Clinical Trial Recruitment
First Report on PharmaLedger Workshops and EventsPharmaLedger
The objective of this document is to provide the 1st report of the PharmaLedger Workshops, Events and the key activities engaged in, and achieved, to end of M18.
The report focuses on the design and delivery of a series of webinars to support the Co-Creation Workshops which became the only method of achieving the aims of dissemination and communication possible during the global COVID-19 pandemic.
The report examines the steps and elements which were factors in the successful delivery of the webinar series including the overall strategy, the format for the webinars, the workflow required to deliver the webinars on time, the method of delivery and the feedback mechanisms put in place to identify improvements and measure impact with audiences.
Recommendation for PharmaLedger governance, operating model and ConstitutionPharmaLedger
PharmaLedger is a project under the auspices of the Innovative Medicines Initiative (“IMI”). Like all projects, IMI PharmaLedger has a start and an end. The IMI PharmaLedger project will conclude in December 2022. For the solutions developed in PharmaLedger to continue to operate and evolve into the future, we must define a sustainable “post-PharmaLedger” governance and operating model. For the purpose of this report, we are referring to the current project as “IMI PharmaLedger” and the future, post-IMI business network as “NextGen PharmaLedger.”
This document builds on our previous work in researching governance and operation models (“D4.1 PharmaLedger Governance Options”). We provide a summary of the different governance options that we considered and make a recommendation for NextGen PharmaLedger’s future governance and operating model. In some cases there is not yet enough certainty about the scope, participants and scale of NextGen PharmaLedger to make a final recommendation. In those cases, we have narrowed the options to a smaller preferred set but have left a final recommendation until later in the project.
This report does not detail the implementation of its recommendations as those details will come later. Furthermore, it is assumed that the reader has a general familiarity with the governance of blockchain business networks and we do not provide exhaustive explanations of all details contained in this document.
Ethereum, Quorum, Hyperledger Fabric and Corda blockchains were studied based on a broad survey of literature, while focusing on major parameters that may affect their choice as building blocks in PharmaLedger’s hierarchical multi-blockchain architecture. Among other things, such parameters include governance, network and data structures, consensus protocol, transaction rate/throughput, security, modularity, ease of deployment, software engineering, costs and industrial adoption.
The results were put into a useful perspective for the PharmaLedger project by referencing and incorporating results achieved in the parallel Use Cases, Governance and Architecture research efforts.
The reported research is followed by a comprehensive comparative assessment of the blockchain technologies in this complex multi-parameter space. The comparison, along with the raw research data, is followed by conclusions and recommendations as to the potential use of the surveyed DLT technologies in the implementation of blockchain-based functionalities of PharmaLedger, to assist the designers of PharmaLedger platform and use cases in architectural and implementation decisions.
European Medicines Agency: Good Practice GuideBill Smith
This document provides a good practice guide on recording, coding, reporting and assessment of medication errors in the context of EU pharmacovigilance activities. It aims to clarify aspects related to medication errors to improve reporting and learning from errors. The guide defines key terms like adverse events and reactions, medication errors and their classification. It outlines legal requirements and provides recommendations on processes for recording, coding and reporting medication errors to competent authorities and in periodic safety reports. The roles and collaboration between various stakeholders in the EU regulatory network are also described.
This chapter discusses the benefits of using cable system diagnostics. It provides background on current asset management approaches, including the use of "bathtub curves" to model failure rates over time. The chapter then examines different cost elements involved in cable system lifecycles. It provides examples estimating the costs and benefits of commissioning tests and diagnostic programs. The estimates suggest diagnostics can reduce outage costs by identifying problems earlier. The chapter concludes that diagnostics allow more accurate forecasting and assessment of asset health, resource needs, and program efficacy compared to a "run to failure" approach.
NEETRAC (Chapter 8: Partial Discharge for HV and EHV Cable Systems)AHMED MOHAMED HEGAB
This document chapter discusses partial discharge (PD) testing for high voltage and extra high voltage power cable systems. It provides details on how PD testing works, how it is applied to cable systems, different sensor and measurement approaches, and considerations for commissioning and maintenance tests. The chapter aims to represent the current state of the art in PD testing for HV and EHV cables and identifies outstanding issues and areas for further development. It includes numerous figures and tables to illustrate concepts and provide recommendations for testing procedures and success criteria.
This chapter discusses monitored withstand techniques for cable systems. A monitored withstand test applies voltage above normal operating voltage for a set time while monitoring a property, such as tan δ, that correlates with cable condition. This allows utilities to make decisions during the test, such as ending the test early if data shows good performance or extending the test if data shows marginal performance. The chapter describes how monitored withstand tests work, how the data is applied, typical test frameworks, and issues that still need resolution. It provides details on monitored withstand using VLF tan δ and discusses criteria developed from research for evaluating test phases and amending test time.
This chapter discusses simple dielectric withstand testing techniques for cable systems. Simple withstand tests involve applying a continuous voltage above normal operating voltage for a set period of time. If the cable fails during the test, it is marked as not passing. The chapter covers how different voltages like DC, VLF and resonant AC are applied in simple withstand tests for MV, HV and EHV cables. It also discusses factors like test voltages, waveforms, success criteria and accuracy of results. The chapter analyzes various studies on simple withstand testing and how test parameters like frequency, voltage and time impact failure rates. It also provides perspectives on using simple withstand tests for diagnostic purposes and cable system maintenance.
This chapter discusses two techniques for assessing the condition of metallic shields in cables: time-domain reflectometry (TDR) and AC resistance (Ω-check). TDR uses reflected pulses to detect discontinuities or faults, while Ω-check measures resistance to evaluate shield integrity. The techniques are applied either online, with the cable in service, or offline. Outstanding issues are discussed, such as identifying far ends in TDR traces and the impact of joints/connectors on Ω-check measurements. Experimental work was conducted at NEETRAC to evaluate the accuracy and effectiveness of these assessment methods.
This document summarizes research on using dissipation factor (tan δ) testing to assess the condition of power cables. It describes how tan δ is measured, factors that affect its accuracy, criteria for evaluating results, and insights from analyzing a database of over 2,000 cable systems. Key findings include developing diagnostic levels based on combinations of tan δ features, observing differences between cable types, and improving assessments by increasing the data set size. The research aims to establish the most reliable approach for utilities to evaluate cable condition using tan δ testing.
This chapter discusses four other diagnostic techniques for cable condition assessment: dielectric spectroscopy, DC leakage current measurement, recovery voltage technique, and polarization/depolarization current technique. It provides details on how each technique works, how it is applied to cables, typical success criteria for interpreting results, considerations for accuracy, and outstanding issues still under research. The document is from a technical report on cable diagnostics published by Georgia Tech Research Corporation.
This chapter discusses time-domain reflectometry (TDR) for cable system diagnosis. TDR works by injecting a pulse into the cable and analyzing reflections to locate impedance discontinuities. Key factors in TDR testing include pulse amplitude, width, and injection method. TDR can detect faults, joints, taps, deteriorated neutrals, and water ingress. However, interpretation requires understanding how cable routing affects measured lengths and potential issues like "ghost" reflections. While useful, TDR also has limitations like requiring skilled operators and difficulty with some cable types or circuit configurations.
The document discusses issues with medium voltage cable systems. It provides historical context on the evolution of cable construction from the 1800s to present day. Key developments include the transition from paper to polymer insulation and the introduction of water tree resistant materials. The document also notes that while cable technology aimed to increase reliability, the process did not always achieve expected benefits, driving the need for cable system diagnostics. Failure rates of early cables are shown in graphs. Various tables outline the generations of cable construction and materials used over time.
This deliverable presents all the dissemination and communication material produced by the ANDROMEDA consortium within the second period of the project, i.e. September 2020 – July 2021. Particularly, it outlines the material created for the promotion of the first workshop (Sept. 2020) as well as the final one (Jun. 2021) of ANDROMEDA. Also, other materials created within the aforementioned period are described. It should be noted that the material produced within the first period of the project has been reported in deliverable D7.2 Initial Dissemination Materials.
D.7.3 is a public deliverable of this project, part of WP7 and additionally includes information about the project and a short description of WP7 in order to ensure that no prior knowledge related to the project, the DoA and the other WP7 deliverables is requested from the reader. Overall, it is based on, and is consistent with the DoA and the GA, but is not a substitute for reading these documents.
Lastly, it should be mentioned that the project has received a six-month extension of its lifecycle due to the COVID-19 impact on project’s activities and thus the submission date of this deliverable has been altered from M15 (Nov. 2020) as it was foreseen in DoA to M23 (Jul. 2021).
Project's Website: www.andromeda-project.eu
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 833881.
The current deliverable under the title “D7.2 Initial Dissemination Material” presents all the dissemination and communication material produced by the EFFECTOR consortium by M6 of project’s lifecycle, i.e. October 2020 – March 2021. Particularly, it outlines in detail the elements of the EFFECTOR visual identity (including the official EFFECTOR templates), the project’s printable dissemination materials (poster, leaflet, brochure) as well as the digital ones (the 1st newsletter issue, 1st press release, project’s overall presentation and other supportive digital material). Moreover, it lists the foreseen actions related to the creation of further dissemination materials from M7 to M18 (project’s completion).
D7.2 is a public deliverable of this project, part of WP7 and additionally includes information about the project's scope and objectives as well as the description of WP7 in order to ensure that no prior knowledge related to the project, the DoA and the other WP7 deliverables is requested from the reader. Overall, it is based on, and is consistent with the DoA and the GA, but is not a substitute for reading these documents.
Project's Website: www.effector-project.eu
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 883374.
The current deliverable reports the activities performed within Task 7.2 “Workshops Coordination” towards the organization of the second ANDROMEDA workshop that was held virtually on the 23rd June 2021. In conjunction with the workshop the consortium also organized online the Demonstration Event, the day after. These activities include the creation of both events’ programme (Agenda), the invitations sent to potential attendees, the digital promotional material created, the creation of the registration link and the information sheet for participation and data processing, the announcements made via the project’s website and social media for raising their visibility. Nevertheless, the core part of this document is dedicated in presenting the topics elaborated by the speakers, the discussions made and the results produced from both events.
Lastly, it should be noted that the ANDROMEDA project team decided to organize these events virtually as the vaccination programme across EU member states was under deployment and the risk for spreading the COVID-19 virus to partners, speakers and attendees was still valid.
Project's Website: www.andromeda-project.eu
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 833881.
The document provides an overview of the Open Virtualization Format Specification, which defines an open standard format for packaging and distributing virtual machines and their associated metadata. The format supports both single and multiple virtual machine configurations, is optimized for distribution and an automated user experience, and is extensible, vendor-independent, and localizable. Key elements of the format include the OVF package structure, OVF descriptor file, virtual hardware description, and core metadata sections.
This document provides a summary of the Oracle Database Performance Tuning Guide, which discusses how to optimize performance in Oracle Database. It covers topics such as performance planning, instance tuning, SQL tuning, and performance tools. The guide contains multiple parts that cover performance planning, optimizing instance performance, and automatic performance diagnostics. It describes features, tools, and methods for improving database performance.
This document provides an overview and administration guide for Oracle Clusterware and Real Application Clusters (RAC). It describes the Oracle Clusterware and RAC software architectures, components, installation processes, and key features. The document also covers administering Oracle Clusterware components like voting disks and the Oracle Cluster Registry, storage management, database instances, services, and backup/recovery in RAC environments. Administrative tools for RAC like Enterprise Manager, SQL*Plus, and SRVCTL are also discussed.
This document provides an introduction and overview of Oracle Clusterware and Real Application Clusters (RAC). It describes the software components and architecture of Oracle Clusterware and RAC. It also provides an overview of installing and managing Oracle Clusterware and RAC environments. Key topics covered include workload management, high availability, tools for administration and monitoring, and considerations for designing RAC environments.
NEETRAC (Chapter 7: Medium Voltage Cable System Partial Discharge) )AHMED MOHAMED HEGAB
This document provides a summary of partial discharge (PD) testing techniques for medium voltage cable systems. It discusses how PD works, how it is measured both in the lab and field, and considerations for sensor selection, source location, calibration, sensitivity checks, and interpreting results. Key points covered include factors affecting PD signal propagation, modeling approaches, measurement philosophies, and techniques for evaluating sensor performance and cable insulation conditions. Accuracy estimates are provided and limitations of repeat testing are addressed. The document aims to represent the current state of the art in PD testing as applied to medium voltage cable systems.
This document provides an introduction to backup and recovery of Oracle databases, focusing on using Recovery Manager (RMAN) for common backup and recovery tasks. It discusses physical database structures used for recovering data like datafiles, redo logs, and control files. It also describes the database recovery process, different forms of data recovery, and how to match failures to appropriate backup and recovery techniques. Backup and recovery strategies are determined by the planned data recovery strategy.
This document is the user's guide for Oracle VM release 3.0.3. It provides an overview of Oracle VM and instructions for common management tasks like setting up storage, networks, server pools, and virtual machines. It also covers converting physical hosts to virtual machines using Oracle's P2V utility and includes troubleshooting guidance.
The document provides an overview of cloud computing, defining its key characteristics and attributes. It discusses the different delivery models including vendor, private, hybrid, and community clouds. It also outlines the main cloud services of Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). The document finds that while cloud computing offers benefits in scalability and reduced costs, it also presents risks regarding security, reliability, regulations, and organizational change that would need to be mitigated.
This document provides a 3-sentence summary of the given document:
The document is the user's guide and reference for PL/SQL Release 2 (9.2) from Oracle Corporation, covering the main features and functionality of PL/SQL such as blocks, variables, cursors, control structures, modularity, and error handling. It was last updated in March 2002 and has John Russell listed as the primary author along with several contributing authors. The document is copyrighted by Oracle Corporation and contains proprietary information regarding PL/SQL that is provided under a license agreement.
The document provides an overview and operation manual for the Retrotec DM32 series digital manometer blower door system. It describes the physical connections and components of the gauge, how to power it on and read results from the home screen, control fan speed and pressure, and change settings like units and averaging time. Troubleshooting tips are provided for issues like fluctuating pressure readings caused by wind or moving tubes.
This document discusses the challenges healthcare organizations face in securing protected health information and complying with regulations in light of increased automation and electronic records adoption. It outlines various security laws and regulations for healthcare including HITECH, which strengthens HIPAA and creates data breach notification requirements. The document provides an overview of best practices for healthcare organizations to assess security risks, prevent data loss, meet regulatory requirements, and secure systems while maintaining patient care.
Design And Implementation Of A Phone Card Companygrysh129
The document describes the design and implementation of a phone card company, including requirements for infrastructure like internet, phone and power services. It discusses VoIP protocols like H.323 and SIP that can be used to set up calling card services. The document also outlines the system topology, hardware, software, billing and softswitch solutions needed to run a prepaid and postpaid calling card business.
This document defines the Open Virtualization Format (OVF) specification for packaging and distributing virtual appliances or machines. It specifies the structure of OVF packages, including an OVF descriptor file and associated files. The descriptor contains metadata about the virtual system, including a hardware profile, operating system, storage, networking, and installation requirements. The goal of the OVF format is to provide an open standard for packaging and distributing virtual systems.
The exhibition on Mobile IT and Big Data saw fewer visitors than expected. While major telecom and technology companies were absent, conferences on developments in these sectors were very successful. In the gloomy economic environment, some areas showed innovation and health, such as mobile business solutions and next-generation telecommunications equipment. Gamification, using game elements in applications, is an emerging phenomenon expected to grow commercial applications. Conferences on Big Data also drew crowds and exposed visitors to this emerging field that could significantly impact business development. In just 10 years, data volumes have exploded exponentially. Big Data aims to create value from diverse data sources and is revolutionizing IT infrastructure through flexible systems like Hadoop. It has already generated $17 billion in revenue and this
Oracle Fusion Cloud Advanced Controls regulates activity in business applications through two components: Oracle Advanced Access Controls and Oracle Advanced Financial Controls. It includes models that establish risk logic and controls that adopt a model's logic to generate permanent incidents. Models return temporary results while controls return permanent incidents. Notifications and worklists inform users of tasks requiring attention, such as new incidents for controls where they are investigators. Records are secured by authorizing eligible users as owners, editors, or viewers.
Assessing the economic impacts of adapting certain limitations and exceptions...Monica Lupașcu
The document provides an analysis of policy options related to exceptions and limitations to copyright in the EU in light of technological advances. It assesses options for remote access and preservation by cultural heritage institutions, e-lending by libraries, text and data mining, and private copying. For each topic, it analyzes the current landscape, rationale for exceptions, and impact of different policy options, providing summaries of the assessment of key options in tables. The overall findings provide guidance on balancing broader access to works with preserving incentives for content creation under different policy scenarios.
The document discusses penetration testing methodologies used by EC-Council. It describes several certification programs offered through EC-Council Press that provide training for security analysts, network security administrators, disaster recovery professionals and other IT security roles. The document also outlines EC-Council's mission to address the need for well-educated information security practitioners and describes the organization's global network of subject matter experts who help set cybersecurity standards.
This document presents a system concept for instrumenting electric power utility towers with sensor technology. The concept involves distributing sensors on transmission structures and conductors to increase efficiency, reliability, safety and security of power transmission. Sensors may communicate wirelessly or via wired connections to data hubs installed on towers. Data is collected, stored and analyzed in a central database using wireless or wired communications between hubs and the database. The system aims to leverage advances in sensors, robotics, unmanned vehicles, satellites and wireless data transmission to enable automated inspection of transmission lines.
This document provides an overview and administration information for Oracle Data Guard. It discusses Data Guard configurations, services, interfaces and protection modes. It provides instructions for creating physical and logical standby databases. It also covers redo transport services, including archiving redo logs, and log apply services for applying redo data to standby databases.
This document provides an overview and instructions for configuring and administering Oracle Data Guard. It discusses Data Guard configurations, services, protection modes and benefits. It also provides guidance on setting up different types of standby databases, prerequisites, directory structures and redo log management.
Similar to PharmaLedger – Advanced confidentiality methods (20)
PharmaLedger – Website and Communication ToolPharmaLedger
The D6.1 Deliverable: website and communication tools, provides the structure and management of the PharmaLedger website (accessible at https://pharmaledger.eu/), as well as a description of the different communication tools that the PharmaLedger project is setting up for the online interaction through project lifecycle.
More specifically this deliverable contains:
• The logo of the project to be used in dissemination and communication activities
• The project website, including the selected domains, its design and initial content.
• The communication tools to be used in the project, both internally and externally.
These include the templates to be used for presentations and reports, the selected internal collaboration tool in the project, and the activities in terms of the use of external tools like social media.
Currently a land page website has been created while the official project website is being designed to be developed and deployed. This deliverable describes the structure of both websites, as well as the different content management and technical considerations being treated.
Tools and the procedures for communications are fully described in deliverable D7.1 Project Reference Manual and Quality Plan.
PharmaLedger Press Release #2 June 2020 PharmaLedger
The PharmaLedger project is a 36-month collaboration between pharmaceutical companies and other entities to develop a blockchain platform and use cases for supply chain, clinical trials, and health data. Selected use cases focus on investigational drug supply chains, matching patients to trials, digitizing clinical trial consent, and integrating medical device data. The project aims to accelerate healthcare innovation through improved trust, transparency, and data sharing across stakeholders while protecting patient privacy.
Anti-Counterfeiting Use Case | Topic #4 of PharmaLedger's 1st Open Webinar PharmaLedger
Learn more about Anti-Counterfeiting through PharmaLedger’s Use Case presentation during our #1 Open Webinar about a Trust-Centric Healthcare Journey.
In this Anti-Counterfeiting Use Case presentation, you will find:
An introduction to the Anti-Counterfeiting use case presented by Daniel Fritz (Novartis) and Alberto López (Imprensa Nacional Casa da Moeda)
The current problem of counterfeiting
Anti-counterfeiting information flow
PharmaLedger Anti-Counterfeit Use Case vision
Anti-counterfeiting example – banknotes
Authentication feature example: Uniqode® physical and digital security
Anti-counterfeiting data collaboration
Anti-counterfeiting use case value proposition
This project has received funding from the Innovative Medicines Initiative 2 Joint Undertaking under grant agreement No 853992. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA.
Disclaimer: Any information on this presentation solely reflects the author’s view and neither IMI nor the European Union or EFPIA are responsible for any use that may be made of the information contained herein.
ePI – Electronic Product Information Use Case | Topic #3 of PharmaLedger's 1s...PharmaLedger
Learn more about ePI | Electronic Product Information through PharmaLedger’s Use Case presentation during our #1 Open Webinar about a Trust-Centric Healthcare Journey.
In this ePI | Electronic Product Information Use Case presentation, you will find:
An introduction to the ePi use case presented by Patrick Maher (Novartis) and Ken Thursby (MSD)
Current paper product information leaflets and the disadvantages
Advantages of digitising product information leaflets using blockchain
Current product information (leaflet) lifecycle
EMA/HMA key principles
PharmaLedger future vision with blockchain
Connecting the supply chain through the 2D data matrix
PharmaLedger project roadmap
Stakeholder and value proposition
This project has received funding from the Innovative Medicines Initiative 2 Joint Undertaking under grant agreement No 853992. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA.
Disclaimer: Any information on this presentation solely reflects the author’s view and neither IMI nor the European Union or EFPIA are responsible for any use that may be made of the information contained herein.
A Trust-Centric Healthcare Journey | Full Presentation of PharmaLedger's 1st ...PharmaLedger
In this #1 Open Webinar | A trust-centric healthcare journey presentation, you will find:
An introduction to the PharmaLedger project presented by Lynn Wang (Johnson & Johnson)
Topic 1 | Clinical Supply Traceability presented by Francesco Spoto (Novartis) and Chad Sklodosky (Pfizer)
Topic 2 | Finished Goods Traceability presented by Dr Jan Wortmann (Bayer) and Bernhard Salb (Roche)
Topic 3 | ePI – Electronic Product Information presented by Patrick Maher (Novartis) and Ken Thursby (MSD)
Topic 4 | Anti-Counterfeiting presented by Daniel Fritz (Novartis) and Alberto Lòpez (Imprensa Nacional Casa da Moeda)
This project has received funding from the Innovative Medicines Initiative 2 Joint Undertaking under grant agreement No 853992. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA.
Disclaimer: Any information on this presentation solely reflects the author’s view and neither IMI nor the European Union or EFPIA are responsible for any use that may be made of the information contained herein.
PharmaLedger Official Presentation OverviewPharmaLedger
Download the Official PharmaLedger Project presentation, which introduces the project, its organisation and summarises the use cases.
In this downloadable presentation, you can find:
An introduction to the PharmaLedger project
PharmaLedger consortium
PharmaLedger objectives
Project organisation and governance
PharmaLedger platform overview
PharmaLedger selected use cases
Project roadmap
Value chain of use cases
Clinical Supply Chain Traceability use case summary
Supply Chain – Finished Goods Traceability use case summary
Supply Chain – E-Leaflet | EPI use case summary
Supply Chain – Anti-Counterfeiting use case summary
Clinical Trial – E-Consent use case summary
Healthdata – Medical Device IoT use case summary
Clinical Trial – Recruitment use case summary
Healthdata – Personalised Medicine use case summary
--
This project has received funding from the Innovative Medicines Initiative 2 Joint Undertaking under grant agreement No 853992. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA.
Disclaimer: Any information on this presentation solely reflects the author’s view and neither IMI nor the European Union or EFPIA are responsible for any use that may be made of the information contained herein.
Personalised Medicine | Topic #4 of PharmaLedger's 2nd Open Webinar PharmaLedger
In this Personalised Medicine Use Case presentation, you will find:
An introduction to IoT Medical Device use case presented by: Beatriz Merino (Universidad Politécnica de Madrid) and Christos Kontogiorgis (Democritus University of Thrace)
The current state and challenges of collection of Real World Data
The negative impacts on Patients and Hospitals
PharmaLedger’s blockchain solution for the future state
Value added by PharmaLedger per actor involved
This project has received funding from the Innovative Medicines Initiative 2 Joint Undertaking under grant agreement No 853992. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA.
Disclaimer: Any information on this presentation solely reflects the author’s view and neither IMI nor the European Union or EFPIA are responsible for any use that may be made of the information contained herein.
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar PharmaLedger
In this IoT Medical Device Use Case presentation, you will find:
An introduction to IoT Medical Device use case presented by : Disa Lee Choun (UCB) and Francesca Rocchi (Bambino Gesù Children Hospital)
The current state and challenges of data collection from medical devices
The advantages of IoT in Clinical Trials
PharmaLedger’s blockchain solution for the future state
Value added by PharmaLedger per actor involved
This project has received funding from the Innovative Medicines Initiative 2 Joint Undertaking under grant agreement No 853992. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA.
Disclaimer: Any information on this presentation solely reflects the author’s view and neither IMI nor the European Union or EFPIA are responsible for any use that may be made of the information contained herein.
Clinical Trial eConsent | Topic #2 of PharmaLedger's 2nd Open Webinar PharmaLedger
In this Clinical Trial eConsent Use Case presentation, you will find:
An introduction to Clinical Trial eConsent use case presented by : Hernando C. Giraldo (Boehringer Ingelheim) and Despina Daliani (Onorach)
The current flow of Clinical Trials and Informed Consent process
Pain points of the current Clinical Trials process
PharmaLedger’s Clinical Trial eConsent solution for the future state
Value added by PharmaLedger per actor involved
This project has received funding from the Innovative Medicines Initiative 2 Joint Undertaking under grant agreement No 853992. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA.
Disclaimer: Any information on this presentation solely reflects the author’s view and neither IMI nor the European Union or EFPIA are responsible for any use that may be made of the information contained herein.
Clinical Trial eRecruitment | Topic #1 of PharmaLedger's 2nd Open Webinar PharmaLedger
In this Clinical Trial eRecruitment Use Case presentation, you will find:
An introduction to Clinical Trial eRecruitment use case presented by: Despina Daliani (Onorach) and Ken Nessel (Pfizer)
The current Clinical Trial Recruitment process
Pain points of the Clinical Trial eRecruitment
PharmaLedger’s Clinical Trial eRecruitment solution for the future state
Value added by PharmaLedger per actor involved
This project has received funding from the Innovative Medicines Initiative 2 Joint Undertaking under grant agreement No 853992. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA.
Disclaimer: Any information on this presentation solely reflects the author’s view and neither IMI nor the European Union or EFPIA are responsible for any use that may be made of the information contained herein.
A Trust-Centric Healthcare Journey Part II | Full Presentation of PharmaLedge...PharmaLedger
In this presentation, you will find:
An introduction to the PharmaLedger project presented by Maria Eugenia (Xenia) Beltran | Project Coordinator / DRA and Use Case co-lead (Universidad Politécnica de Madrid)
Topic 1 | Clinical Trial eRecruitment | Despina Daliani (Onorach) and Ken Nessel (Pfizer)
Topic 2 | Clinical Trial eConsent | Hernando C. Giraldo (Boehringer Ingelheim) and Despina Daliani (Onorach)
Topic 3 | Health Data IoT Medical Device | Disa Lee Choun (UCB) and Francesca Rocchi (Bambino Gesù Children Hospital)
Topic 4 | Health Data Personalised Medicine | Beatriz Merino (Universidad Politécnica de Madrid) and Christos Kontogiorgis (Democritus University of Thrace)
You can also learn more about our #2 Open Webinar on Clinical Trials & Health Data by rewatching our video recording including the Q&A by clicking on the button below:
This project has received funding from the Innovative Medicines Initiative 2 Joint Undertaking under grant agreement No 853992. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA.
Disclaimer: Any information on this presentation solely reflects the author’s view and neither IMI nor the European Union or EFPIA are responsible for any use that may be made of the information contained herein.
PharmaLedger’s Spotlight Session Presentations at DIA Europe 2021PharmaLedger
Download PharmaLedger’s Spotlight Session presentations from DIA Europe 2021.
In addition to our 3D Virtual Booth that took place all week long at DIA Europe 2021, PharmaLedger hosted two 60-minute Spotlight Sessions.
Spotlight Session #1: PharmaLedger – Demonstrating the Vision of Blockchain Enabled Healthcare
Tuesday, March 16th the sessions kicks off with an introduction of the PharmaLedger project, followed by a look into our Electronic Product Information (ePI) and Anti-Counterfeiting use cases, then concluding with a full demonstration of our first prototype of the PharmaLedger ePI app. Speakers include PharmaLedger Industry Lead Daniel Fritz (Novartis), and ePI use case co-leads Patrick Maher (Novartis) and Ken Thursby (MSD).
Spotlight Session #2: PharmaLedger – Data Privacy and the Vision of a Blockchain Enabled Healthcare
Friday, March 19th following a PharmaLedger introduction, our partners explore how data privacy and blockchain are being used to shape the project and our patient-centric solutions, and look into how PharmaLedger is reshaping the informed consent process for clinical trials with our eConsent use case. Speakers include PharmaLedger Regulatory, Legal & Data Privacy Framework Co-Lead Nenad Georgiev (KU Leuven), eConsent use case co-lead Hernando Giraldo (Boehringer Ingelheim), and Baldwin Mak (Boehringer Ingelheim).
This project has received funding from the Innovative Medicines Initiative 2 Joint Undertaking under grant agreement No 853992. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA.
www.imi.europa.eu
Disclaimer: Any information on this article solely reflects the author’s view and neither IMI nor the European Union or EFPIA are responsible for any use that may be made of the information contained herein.
Osvaldo Bernardo Muchanga-GASTROINTESTINAL INFECTIONS AND GASTRITIS-2024.pdfOsvaldo Bernardo Muchanga
GASTROINTESTINAL INFECTIONS AND GASTRITIS
Osvaldo Bernardo Muchanga
Gastrointestinal Infections
GASTROINTESTINAL INFECTIONS result from the ingestion of pathogens that cause infections at the level of this tract, generally being transmitted by food, water and hands contaminated by microorganisms such as E. coli, Salmonella, Shigella, Vibrio cholerae, Campylobacter, Staphylococcus, Rotavirus among others that are generally contained in feces, thus configuring a FECAL-ORAL type of transmission.
Among the factors that lead to the occurrence of gastrointestinal infections are the hygienic and sanitary deficiencies that characterize our markets and other places where raw or cooked food is sold, poor environmental sanitation in communities, deficiencies in water treatment (or in the process of its plumbing), risky hygienic-sanitary habits (not washing hands after major and/or minor needs), among others.
These are generally consequences (signs and symptoms) resulting from gastrointestinal infections: diarrhea, vomiting, fever and malaise, among others.
The treatment consists of replacing lost liquids and electrolytes (drinking drinking water and other recommended liquids, including consumption of juicy fruits such as papayas, apples, pears, among others that contain water in their composition).
To prevent this, it is necessary to promote health education, improve the hygienic-sanitary conditions of markets and communities in general as a way of promoting, preserving and prolonging PUBLIC HEALTH.
Gastritis and Gastric Health
Gastric Health is one of the most relevant concerns in human health, with gastrointestinal infections being among the main illnesses that affect humans.
Among gastric problems, we have GASTRITIS AND GASTRIC ULCERS as the main public health problems. Gastritis and gastric ulcers normally result from inflammation and corrosion of the walls of the stomach (gastric mucosa) and are generally associated (caused) by the bacterium Helicobacter pylor, which, according to the literature, this bacterium settles on these walls (of the stomach) and starts to release urease that ends up altering the normal pH of the stomach (acid), which leads to inflammation and corrosion of the mucous membranes and consequent gastritis or ulcers, respectively.
In addition to bacterial infections, gastritis and gastric ulcers are associated with several factors, with emphasis on prolonged fasting, chemical substances including drugs, alcohol, foods with strong seasonings including chilli, which ends up causing inflammation of the stomach walls and/or corrosion. of the same, resulting in the appearance of wounds and consequent gastritis or ulcers, respectively.
Among patients with gastritis and/or ulcers, one of the dilemmas is associated with the foods to consume in order to minimize the sensation of pain and discomfort.
The Children are very vulnerable to get affected with respiratory disease.
In our country, the respiratory Disease conditions are consider as major cause for mortality and Morbidity in Child.
Travel Clinic Cardiff: Health Advice for International TravelersNX Healthcare
Travel Clinic Cardiff offers comprehensive travel health services, including vaccinations, travel advice, and preventive care for international travelers. Our expert team ensures you are well-prepared and protected for your journey, providing personalized consultations tailored to your destination. Conveniently located in Cardiff, we help you travel with confidence and peace of mind. Visit us: www.nxhealthcare.co.uk
Nutritional deficiency Disorder are problems in india.
It is very important to learn about Indian child's nutritional parameters as well the Disease related to alteration in their Nutrition.
PGx Analysis in VarSeq: A User’s PerspectiveGolden Helix
Since our release of the PGx capabilities in VarSeq, we’ve had a few months to gather some insights from various use cases. Some users approach PGx workflows by means of array genotyping or what seems to be a growing trend of adding the star allele calling to the existing NGS pipeline for whole genome data. Luckily, both approaches are supported with the VarSeq software platform. The genotyping method being used will also dictate what the scope of the tertiary analysis will be. For example, are your PGx reports a standalone pipeline or would your lab’s goal be to handle a dual-purpose workflow and report on PGx + Diagnostic findings.
The purpose of this webcast is to:
Discuss and demonstrate the approaches with array and NGS genotyping methods for star allele calling to prep for downstream analysis.
Following genotyping, explore alternative tertiary workflow concepts in VarSeq to handle PGx reporting.
Moreover, we will include insights users will need to consider when validating their PGx workflow for all possible star alleles and options you have for automating your PGx analysis for large number of samples. Please join us for a session dedicated to the application of star allele genotyping and subsequent PGx workflows in our VarSeq software.
- Video recording of this lecture in English language: https://youtu.be/Pt1nA32sdHQ
- Video recording of this lecture in Arabic language: https://youtu.be/uFdc9F0rlP0
- Link to download the book free: https://nephrotube.blogspot.com/p/nephrotube-nephrology-books.html
- Link to NephroTube website: www.NephroTube.com
- Link to NephroTube social media accounts: https://nephrotube.blogspot.com/p/join-nephrotube-on-social-media.html
Nano-gold for Cancer Therapy chemistry investigatory projectSIVAVINAYAKPK
chemistry investigatory project
The development of nanogold-based cancer therapy could revolutionize oncology by providing a more targeted, less invasive treatment option. This project contributes to the growing body of research aimed at harnessing nanotechnology for medical applications, paving the way for future clinical trials and potential commercial applications.
Cancer remains one of the leading causes of death worldwide, prompting the need for innovative treatment methods. Nanotechnology offers promising new approaches, including the use of gold nanoparticles (nanogold) for targeted cancer therapy. Nanogold particles possess unique physical and chemical properties that make them suitable for drug delivery, imaging, and photothermal therapy.
3. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 3/34
DOCUMENT INFO
Authors
Authors Organisation
Sînică Alboaie RMS
Ana Balan RMS
Michael Sammet University Hospital Würzburg
Christos Patsonakis CERTH
Darlene MacDonald NVS
Nicu-Cosmin Ursache RMS
Marco Cuomo NVS
Amol Shah ABBVIE
Document History
Date Version Editor Change Status
10/01/2020 V1.0 Sînică Alboaie
Table of contents and Initial
content
Draft
26/06/2021 v2.0
Sînică Alboaie
Ana Balan
Amol Shah
Christos Patsonakis
Darlene MacDonald
Marco Cuomo
Michael Sammeth
Sebastian Dumitrescu
Nicu-Cosmin Ursache
Continuous input in sections
(Separate documents and
WP3 working streams)
Summarized and joined
together in June 2021)
Draft
30/06/2021 v3.0 Ana Balan
Review, editing and
formatting
Draft
15/07/2021 v3.0
María Eugenia Beltrán/
Cecilia Vera
Final review for submission Final
02/12/2021 v3.1
María Eugenia Beltrán/
Cecilia Vera
Reviewers comments
integrated
Final
Disclaimer: Any information on this deliverable solely reflects the author’s view and neither IMI nor the European
Union or EFPIA are responsible for any use that may be made of the information contained herein.
4. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 4/34
TABLE OF CONTENT
EXECUTIVE SUMMARY..................................................................................................................................5
1. INTRODUCTION.....................................................................................................................................6
2. STATE OF THE ART RESEARCH...............................................................................................................8
2.1. W3C DID and VC standards...........................................................................................................8
2.2. Data Sharing alternatives............................................................................................................13
3. PHARMALEDGER PLATFORM SPECIFIC RESEARCH .............................................................................16
3.1. Confidentiality methods directly obtained from the OpenDSU Architecture ............................17
3.2. Confidentiality attacks on the PharmaLedger platform .............................................................18
3.3. Ledger selection as a confidentiality method.............................................................................22
3.4. Trustless collaborations vs. the cost of auditability....................................................................26
3.5. Computation over encrypted (secret) inputs .............................................................................27
3.6. OpenDSU and use cases as choreographies. OpenDSU and ZKP................................................29
4. CONCLUSIONS.....................................................................................................................................32
4.1. Risks from excessive properties of the confidentiality methods................................................32
4.2. Future research...........................................................................................................................32
BIBLIOGRAPHY ............................................................................................................................................33
LIST OF FIGURES
Figure 1 Antagonism between user transparency and user privacy ............................................................6
Figure 2: Solid architecture with blockchain anchored hashes ..................................................................14
Figure 3 Topology of DIF Identity Hubs.......................................................................................................15
Figure 4 Encrypted Data Vaults ecosystem ................................................................................................15
Figure 5: Combination of centralized archetypes.......................................................................................24
Figure 6: Comparative of system archetype due to censorship resilience and privacy .............................25
Figure 7: Tamper resilience and auditability comparative .........................................................................25
Figure 8 Various constraints regarding auditability and trustless collaboration........................................26
Figure 9 Appropriate solution for each category........................................................................................30
LIST OF TABLE
Table 1: Summary of critiques and concerns about DID-related standards proposed by W3C.................12
Table 2 Confidentiality methods and impact for the Pharmaledger Use Cases.........................................16
Table 3: OpenDSU Confidentiality methods summary...............................................................................17
Table 4: Actor impacting confidentiality.....................................................................................................18
Table 5: types of attacks on confidentiality that are relevant in the PharmaLedger use cases.................20
Table 6: Attacks on the confidentiality measure of the OpenDSU.............................................................21
Table 7: mitigation solutions to attacks on confidentiality identified........................................................22
Table 8: generic use cases in which the concept of executing an algorithm on secret data......................27
Table 9: the privacy features of the algorithm, input and result................................................................28
Table 10: Use Case constraints regarding confidentiality and verifiability.................................................29
Table 11: Future research...........................................................................................................................32
5. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 5/34
EXECUTIVE SUMMARY
This report summarizes the research activities completed in task T3.4 (Research and identification of
advanced confidentiality methods) in order to provide best practices for supporting software
development in T3.5 (Reference Implementaton of Advanced Confidentiality Methods) [1].
In this deliverable, we documented the development research achievements regarding the PharmaLedger
blockchain platform and many of the activities required to modify and improve the prerequisite
blockchain technologies used to build the PharmaLedger platform. During this task, while implementing
the platform, a series of challenges were identified and documented. In addition, innovations regarding
smart contracts execution and changes regarding deployment of the blockchain platform were proposed.
We believe that the implementation of the use cases will generate further suggestions for improvements.
Development and research continues and provides further input for the prerequisite blockchain
technologies used to build the PharmaLedger platform.
6. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 6/34
1. INTRODUCTION
In the PharmaLedger platform architecture principles document [2], the following requirements have
been identified as necessary to consider with respect to confidentiality methods used within the
PharmaLedger ecosystem:
1. Technical implementations shall be future-proof in general and technology agnostic in particular,
such that any hard dependency on specific vendors or solutions are to be avoided when developing
the code.
2. PharmaLedger use cases shall be enabled to independently integrate any credential issuers,
decentralized identities, or any other kind of validation methods relevant in the market (also the
traditional X.509 standard).
3. Confidentiality solutions shall offer flexible approaches for discovering an acceptable compromise
between sometimes conflicting aspects, e.g., security model, privacy constraints, economical
interest of for-profit PharmaLedger participants, protection of patients and other non-profit users
against the surveillance economy, and user experience respectively the usability of the
PharmaLedger ecosystem to the different stakeholders.
Whereas requirements (1) and (2) can largely be addressed by proper system design and selection of
appropriate technologies, requirement (3) constitutes a more conceptual challenge that possibly needs
to be addressed specifically per use-case taking into consideration the respective stakeholders involved.
Here, a brief review of the key terms that we employ when describing confidentiality considerations of
digital identities is provided. As many of these terms have been adopted from social sciences and originally
describe general, subjective concepts in the real world that to date have only vaguely been defined in the
context of digital systems such as distributed ledgers, establishment of the common understanding and
usage of terms is essential.
Figure 1 Antagonism between user transparency and user privacy
Digital systems that allow users to retain most of their PII allow for a high level of privacy (left edge of the
scale), but become trust-unworthily by failing to identify participants by their real-world attributes. By
exposing PII, real-world users become transparent and therefore also trustworthy to the system (right edge
of the scale), but lack privacy. The "slider" between these two concepts needs to be adjusted to build trust
on both sides, the user side as well as the system side.
Throughout this report the use of the term "privacy" refers to the concept of protecting personally
identifiable information (PII) of users. On the contrary, "transparency" determines the degree to which
the users expose PII to the system they are using. The concept of "trust" describes the degree to which
one party (i.e., the trustor) is willing to rely on the actions of another party (i.e., the trustee). Naturally,
users of a distributed ledger are likely to build trust in the system when the preservation of their privacy
7. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 7/34
is high, whereas the systems (respectively, the other users of the ledger) increasingly trust users who are
transparent.
Obviously, the concepts of "privacy" and "transparency" are competing with each other. The objective of
a trusted environment is to create trust on both sides, i.e., between each particular user of the system
and all the other interacting persons, entities, and parties of the system. In order to achieve this goal, a
use-case specific compromise for the adjustment between "privacy" and "transparency" needs to be
found (Figure 1).
"Confidentiality" in turn includes "privacy", but also extends to the safeguarding of entrusted information
that may include trade or other secrets.
The report is structured as follows: we first review established models for handling digital identities in
distributed systems, particularly with respect to their approaches to the privacy-transparency antagonism
(Section2 STATE OF THE ART RESEARCH), before critically comparing the safeguarding methods proposed
in these models specifically to the confidentiality methods we present the so-called "OpenDSU"
architecture for the PharmaLedger Project (Section3 PHARMALEDGER PLATFORM SPECIFIC RESEARCH).
Finally, we provide a summary of the result, conclusions and a proposal for further steps to be considered
during software development in task T3.5 (Reference Implementaton of Advanced Confidentiality
Methods).
8. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 8/34
2. STATE OF THE ART RESEARCH
Over the recent years, digital systems have gradually moved away from traditionally employed central
database systems, where each organization controls the access to user data they store, and data owners
are authenticated by classic usernames and passwords. The more recent introduction of federated
identity systems enables users to verify their digital identity with a third party providing credential services
hence reducing the exposure of their personal information whilst accessing the applications of numerous
organizations.
However,concerns regarding possible data leakage and potential abuse by malicious providers of
federated identities have surfaced and as such, modern systems are moving towards more user-centric
concepts of control: verifiable credentials aim at encapsulating the minimal amount of personal data
necessary in order to "bind" a certain user to some data or transaction. As suggested by the naming,
verifiable credential schemas are designed to promote verification processes, but with ever less personal
information exposed by the users, the issues of user validation are growing complex even with elaborate
methods for verification in place.
With these new challenges also paradigms of thinking about limiting the access for potentially malicious
data controllers moves towards concerns regarding confidentiality issues that might arise from potentially
malicious users. More specifically, currently developed technologies must address the challenge of how
to create trust in a trustless digital environment, where the interacting users or entities present quasi zero
information regarding their identities.
2.1. W3C DID and VC standards
The World Wide Web Consortium (W3C) has become a major authority for researching, developing, and
establishing standards for the internet and complementary distributed systems. The degree of maturity
(from low to high) for specification proposals provided by W3C is specified as:
1. Working draft
2. Candidate recommendation
3. Proposed recommendation
4. W3C recommendation
In the context of our present research, W3C provides a "candidate recommendation" document on
distributed identities, and a "W3C recommendation" standard on verifiable credentials (VCs). In the
further subsections, we will ew these and other relevant documents in order to present an image of
current state of the art protocols.
2.1.1. Digital identities: Verification vs. Validation
In a world that is becoming more digital, access to information and services covering many aspects of life
are becoming increasingly accessible through internet platforms. To access these platforms, one needs to
transfer his/her identity to the digital world [3] in order to establish "trust" and enable interactions with
other persons and organizations across the network. However, one cannot expect to gain trust from other
actors just because they have a digital identity. In order to get trusted, the digital identity and its owner
need to go through verification and validation processes.
Verification is the process of checking that the information of the digital identity is correct and that we
are interacting with the real party that has been granted access to the respective information. Validating
is going a step further, it is acknowledging (trusting) the verified identity to access some resources in order
to cooperate. A physical credential, such as the picture on an official identity document, can be used to
verify that the document holder is the owner of the document. The document itself can be verified to see
if it is authentic. If there is still a doubt, to be able to fully validate an official identity document as the
9. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 9/34
passport and completely trust its owner, it is possible to check a government database to see if all the
information is valid.
In the same way, the owner of a digital identity can be verified and validated. To verify that the user is the
real owner of the identity, passwords (something only the owner should know) are used. To reinforce this
verification, two-factor authentication where the owner has to confirm the connection on his device
(something he has) as well three factor authentication such as biometrics (something he is) can be used.
Now, if it is not enough for an organisation to trust the owner, it is possible to verify the owner has entered
correct information for her/his digital identity profile. To do so, the organisation can ask the owner to
share supporting documents with personal information, such as a passport or a recent bill to verify
personal details e.g. name and address. However, in order to validate this information, the organisation
has to check further e.g. the government database to see if the information matches or contact the service
provider to confirm if the identity owner is one of their customers.
2.1.2. Verification and validation issues of physical and current digital identities
While the authentication part is solid, verification and validation lack smoothness. To date most digital
systems have been designed from the organisation's point of view anduser information is maintained in
the databases of all the services accessed. Not only do these practices raise concerns regarding t privacy
and protection of data asusers must create an identity per service they use, often providing the same
information and supporting documents again and again. Moreover, when identity management and
validation is controlled by a central company, users can experience difficulties interacting "freely" with
other entities as algorithms will control, to some extent, transactions and peers to transact with.
It is also challenging for organisations who have few options to verify and validate the information
provided by the user. They have often no other choice than to rely on a single source of trust that could
be corrupted.
2.1.3. Decentralized Identifiers and Verifiable Credentials Standards
In contrast to organization-centric ID management, the concept of Decentralized Identities (DIDs) has
recently been designed so that they may be decoupled from centralized registries, identity providers, and
certificate authorities. Amongst other approaches to DIDs, in particular the Self-Sovereign Identity (SSI)
model has been theorized to address the problem of digital identities, for which proofs of concept are
under active development. Based on 10 principles [4], this model is designed with the user at its core.
Distributed ledger technology (DLT), popularly known as "blockchain", allows the creation of a
decentralized and immutable registry for digital identities. Identifiers representing digital identities on
this registry are by nature decentralized. These decentralized identifiers (DIDs) can be used to represent
people, objects [5], datasets [6], etc. To authenticate as the owner of these identities, users need a
cryptographic key that is created at the registration. To support management of cryptographic keys and
seamless interaction with the network, wallets, that is light software applications in the form of browser
extensions, mobile apps or websites, make the bridge between the user and the DLT.
In this model, verifiable credentials (VC) [4] are associated with digital identities in the same way that
physical credentials are tied to identities. The difference is that VCs are designed for web environments
where it is more difficult to verify and validate the information due to the fact that digital patterns are
more easily tampered with than their biological or physical counterparts, as such, confidence in a virtual
vis-à-vis needs to be provided by complementary mechanisms. Hence, in order to bring trust in an a priori
trustless environment, VCs require to be cryptographically secure, privacy respecting, and machine-
verifiable [4].
10. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 10/34
2.1.4. Verification and validation issues of DID and VC
There are ongoing efforts [4] to standardize concepts of DIDs and VCs from the W3C organization and we
agree that it is important to continue work on these specifications in order to provide interoperable
solutions. In fact, several innovations for DID ecosystems have recently been proposed, and we are
focusing ourselves on a (novel) implementation of “digital sovereignty” for identities of physical persons
or organizations, and in addition, for objects such as data and applications.
However, these novel standards must be considered carefully. First and foremost, the proposed methods
and protocols have not been reviewed by a wide community of security/cryptographic experts. This leads
on one hand often to the development of unnecessarily complex algorithms and, on the other hand,
sometimes to algorithms only vaguely described in DID specifications, which possibly could be substituted
by well-known cryptography techniques. Critical reviews of these standards are necessary because its
absence could lead to privacy and security harm to users [7].
Particularly one point that we want to discuss in the present document is validation, as thebecause W3C
specification is very vague on this point. In addtion, the the W3C specification values privacy over
transparency. While we agree that privacy is very important, we think an “absolute” privacy is not
desirable as it makes validation strategies harder to perform on the identity owner. The absence of strong
validation strategies would make digital identity owners less accountable and would result in a loss of
trust [3] [8].
Moreover, we would rather avoid having too many standards on data models, Domain Specific languages
(DSLs) and protocols and concentrate on general purpose languages that provide more space for
developers to build solutions to their use cases more easily and to let them create custom strategies for
validation. Indeed, standards are required to achieve interoperability between all the actors of a network,
but interoperability is realized through semantics rather than through over-complex data models. The
biggest challenge for self-sovereign identities remains its general adoption, and we need a solution that
can be readily adopted by developers, enabling them to seamlessly focus on solving their specific tasks
based on self-sovereign identities.
2.1.5. DID shortcomings
Decentralized Identifiers (DIDs) as defined by the W3C standard [9], aim to provide a uniform naming
scheme for "subjects" (e.g., physical users and entities) as well as for "objects" (i.e., physical, digital, logical
things). This scheme is composed of a so-called "DID method" specifying the registry to which a DID has
been issued, and a "key" that is used to identify the DID at the corresponding registry end-point. As for
web-based resource identifiers, Universal Resource Identifiers (URIs), the W3C standard expects the
registry to permit the corresponding issuer to resolve a DID document for the given key. However, the
current lack of defining access controls in the W3C standard makes the specification even more prone to
correlation attacks [7] than traditional centralized or federated identity systems. Moreover, the W3C DID-
specifications in their current format do not enforce the privacy of any attributes attached to the
Verifiable Credentials produced by service end-points accessed via DID documents, and merely
recommend that DID documents should not contain PII.
In addtion to these technical shortcomings, another questionable concept in the W3C DID handling is
whether the unified retrieval of DIDs is necessary at all, or in other words, up to which degree the retrieval
of DID documents via centralized servers proposed by W3C actually contradicts the philosophy behind
DIDs. The W3C standard foresees that DID documents once retrieved are stored in a public blockchain,
which represents a unified and therefore central instance for querying DIDs. In many cases, however, DID
documents are provided by third-party services that function also correspondingly as identity providers.
Therefore, direct contact with these decentralized issuers seems more efficient than the excessive
redirection proposed by W3C.
11. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 11/34
2.1.6. VCs shortcomings
Verifiable Credentials (VCs) are provided according to the W3C DID specification along with the requested
DID documents and therefore rely on serialization of digital signatures they comprise. To this end, some
examples in the W3C VC specification [4] employ the Semantic Web Resource Description Framework
(RDF) format, which turns out to be problematic for serializing VCs in more than one way: (i) RDF does not
specify a syntax like XML, but "semantic" graphs that can be canonicalized and serialized in different ways
[10]; (ii) RDF lacks standardized bit-serialization as necessary for signatures [11]; (iii) W3C encourages VC
implementations [12] to detach "data proofs" (i.e., signatures) from the actual "payloads" (i.e., messages),
which paves the way for signature exclusion and signature replacement attacks [13] (McIntosh and Austel,
2005). These shortcomings stem from the conflict between implementing user privacy and the aims by
W3C to "link” data by reusing URIs as labels of nodes in the graph [14]. However, since VCs in general are
not dependent on RDF serialization, these considerations are specific to issues that may arise from the
W3C specifications for VCs.
A ubiquitous challenge for VC-based authentication systems is, in contrast, that the verification of data
ownership by checking digital signatures does not extend to the validation of the VC-presenting user or
entity, i.e. the confirmation that the presented VC actually belongs to the presenter. On the one hand VC
users could be validated by relying on documents issued by central authorities of trust (e.g., driving
license), which however would largely prevent the use of DIDs, require authenticable documents and also
involve third authorities in the validation process. On the other hand, cryptographic methods for the
remote authentication of biometric markers have been proposed [15]. However, these systems require
biometric-dependent information (helper data), which could potentially reveal significant PII from the
corresponding user [16]. There is an ongoing controversy on how to resolve the conflicts between user
privacy and user validation, with no standard yet having been settled.
2.1.7. Relevant Types of VCs and Methods for Verification
Traditionally signed VCs are usually confirmed by the verifier in four steps:
1. Locally compute the hash of a presented VC as specified by the credential schema (e.g. SHA256).
2. Resolve the VC issuer's DID and retrieve the public key.
3. Calculate the local signature from the local hash and the public key.
4. Compare the local signature to the credential signature. If there is a match the verification is
successful; if there are discrepancies, the verification fails.
In contrast Zero Knowledge Proof (ZKP)-enabled credentials minimize the user information exposed to a
system. In this case, a prover provides VCs as well as a signature over the original VC content. This
signature can be re-computed by the presenter based on the VCs, to give proof of ownership and also of
authenticity of the data.
2.1.8. Summary of critiques and concerns about DID-related standards proposed by W3C
As introduced in the last section, the DID standards recently proposed by W3C have not yet been
thoroughly reviewed by sufficient members of the security/cryptographic community. Therefore, these
often proprietary and also unnecessarily complex protocols/algorithms hamper transparent
communication especially with non-technical stakeholders, e.g., business representatives, but also
amongst programmers without a strong background in cryptography. Hence, in our present report we will
carefully scrutinize the claims of privacy and security by cryptographic methods employed in W3C-
standards for VC/DID concepts, in order to pinpoint the merits and risks of these emerging (potential)
standards later on in our final report.
12. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 12/34
Table 1: Summary of critiques and concerns about DID-related standards proposed by W3C
Critiques Examples / Explanation
Impact on confidentiality when
loading from linked documents
from internet
JavaScript Object Notation for Linked Data (JSON-LD) as well as
Semantic Web serialization can depend on the resolution of
external, potentially insecure documents to URIs to "link" data,
similar in spirit to XML namespaces. The same argument holds true
for DID documents that include external resources.
Risk of contradictory or arbitrary
standards
Semantic Web graphs described by RDF can be serialized in
different manners, which in the absence of specification by W3C
standards often are determined in an ad-hoc fashion.
Nonessential complexity
introduced by Domain Specific
Languages (DSLs)
We can say that W3C Standards introduce new DSLs in the form of
DID documents, VC documents, and presentation schemas. There
is a tendency (and a temptation) to add new features to these DSLs
in the name of standardization (to minimise the custom code from
the validation and replace it with standardised verification).
However, our position is that this path creates unnecessary
complexity and makes the standards harder to implement and
incompatible with real use cases.
The problem of modelling generic
interfaces for verifiable data
registries (VDRs)
In the absence of concrete specifications for DID documents in the
W3C standard, issuing services can include heterogeneous data,
including elements that reveal PII of the user.
Decentralized Key Management
System (DKMS) proposals
The W3C universal naming scheme envisions the DIDs retrieved
from decentralized third-party services to be stored and queried in
a public blockchain, which produces counterproductive overhead
by sending back and forth requests that would not be necessary
when directly contacting the corresponding issuers.
DID Authentication/Secret
Exchanges
Although DIDs claim to support zero-knowledge proofs, there is no
advanced cryptography used outside of RSA and elliptic curve
Ed25519 signatures in the standards themselves.
One time use DIDs If DIDs are supposed to be for one-time usage, then an anonymous
credential scheme could actually substitute the blockchain-
anchored use of DIDs, providing a higher degree of efficiency.
13. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 13/34
Critiques Examples / Explanation
Portability of the Digital Wallets There are no clear standards with respect to how private keys
associated with DIDs should be handled. We believe that key
management and wallet programmability could influence the
winners in the battles between DID methods and therefore all the
extensions and particularities of the Key Storage solution could be
as influential as the standards. Additionally, these DIDs are used for
signing and encryption. Ability to have proper key management for
signing and encryption is the key differentiator between DID
methods and will dictate the actual libraries that can be embedded
in the digital wallets.
Limitations in judging the security
and privacy properties
DID documents tend to be resolved using third parties, which may
disclose PII. Typically, these documents are stored in publicly
accessible blockchains.
Individual metadata is not
ontology-friendly, not
abstractable/classifiable
The type of credentials employed not only determines the
verification protocol, but depending on the trust in the issuer
requires custom code for validation. This again leads to not being
able to rely on standardized verification.
Schemas are still code Configurations and schemas are assimilable with code and as such,
have the same trust issues as any code. Schemas cannot be
evaluated for "truthfulness", you need to check and trust the
implementation (e.g., by checking the provenance of the signed
code).
2.2. Data Sharing alternatives
Traditional data stores are designed around the notion of separating storage of dat; which we can imagine
as a "server", from a layer of applications; which represent "clients" that make use of the stored data. In
order to safeguard the privacy of data, encryption is an essential measure to take into consideration.
Questions such as which components of the architecture have access to the (unencrypted) data and who
controls the private keys need to be addressed.
● Client-side encryption offers a high level of security and privacy, especially if the metadata can be
encrypted as well, but does not imply that the corresponding data vault is optimized for storing
such (individually) encrypted data and the question of key management becomes more complex
when data needs to be shared.
● Storage-side encryption is usually implemented as whole-disk encryption or filesystem-level
encryption, which provides well understood and space-efficient algorithms, however requires the
private keys to be managed by the service provider or controller of the storage server, which
usually is a different entity than the user who is storing the data.
14. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 14/34
As an intermediate solution gateway-side "encryption as a platform" systems have emerged, e.g Tahoe-
LAFS [17] which perform encryption and decryption themselves in a way that is transparent to the client
application,. Although gateway-side encryption eliminatesthe client of responsibilities forkey
management, it requires the keys to reside on "gateway" servers, which encrypt the data before passing
it to the storage servers, undermining users ability to control their data in a self-sovereign fashion.
2.2.1. Solid
The Semantic Web architecture known as "Solid" has been designed by the W3C director and inventor of
the Web, Berners-Lee, originally to decentralize the Web by transferring control of data from a central
authority to users [18]. The core concept of this architecture is based on so-called "Solid Pods", i.e.,
containers to store data in RDF either locally on a device such as a mobile phone or on a cloud server
selected by the user. Approaches connecting the Solid architecture and Blockchain employ cryptographic
hashes of these pods to anchor data like VCs in a distributed ledger for verification purposes [19], with
example certification use case applications such as those in test-vaccination scenarios arising in the
current COVID-19 pandemic [20]. Clearly, such approaches provide users full control over storage and
ownership of their data. However, as the Solid architecture lacks kernel security modules or other
confidentiality methods [7]. responsibilities concerning persistent data storage (e.g., when storing data
on ones own mobile device) and privacy/protection (e.g., when employing cloud storage by a provider)
are delegated to the user.These shortcomings severely limit Solid-based approaches, rendering
blockchain-anchored storage in Solid Pods particularly unsuitable for peer-to-peer transactions required
by several use cases considered in this work.
Figure 2: Solid architecture with blockchain anchored hashes
Data (purple hexagons, middle) is stored at the user's premises and hash-anchored to a blockchain (red
circles to the right). Figure reproduced from [20]
2.2.2. Identity Hubs by decentralized Identity Foundation (DIF)
Similar to the Solid architecture, DIF's Identity Hubs [21] are document-based data stores that provide
end users the option of either installing and running the server portion of the data store on a local device
they control, or to sign up to an already configured instance hosted by a trusted third-party e.g., a
commercial provider, an affiliated institution, etc.. Data remains stored on a server organized in
collections. In contrast to Solid Pods, peer-to-peer communications through DID authentications are
central to the Identity Hub design, managed through a DID resolver responsible for instance for the
management of the end user's profile, transmission of human- or machine-readable messages through
the Actions interface, or pointers to external services. As a trade-off, such a concept of system-wide DID
resolution prevents self-sovereign identity management by users and therefore limits privacy. Moreover,
also encryption standards were ignored in the basic concept and only proposed as an option later-on [22].
15. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 15/34
Figure 3 Topology of DIF Identity Hubs
A blockchain-backed DID Resolver allows to resolve DIDs of other users for exchanging messages. Figure
reproduced from [21]
2.2.3. Encrypted Data Vaults
W3C proposed guidelines for "Encrypted Data Vaults" [23], which envision identifier-agnosticprivacy-
respecting storage solutions where users can pass on their keys in encrypted form together with the data
to be stored. In order to enable data sharing amongst multiple entities possibly employing DIDs, Encrypted
Data Vaults provide one or multiple standard authorization schemes, such as OAuth2, Web Access
Control, or platforms implementing the authorization capabilities for linked data systems standards [24].
However, whereas some client responsibilities such as encryption and versioning are delegated to the
server, other tasks such as data chunking and replication remain with the user by design. Furthermore,
Encrypted Data Vaults allow malicious service providers, though not in possession of the keys used for
encryption, to exploit information about the size, modification frequency and access patterns of the
stored files to derive information about the nature of transactions or correlation patterns between
multiple entities sharing access. Such attacks are facilitated by some of the meta-data, e.g. version
numbers, remain unencrypted and/or authentication methods are not enforced by the Encrypted Data
Vaults specification [25].
Figure 4 Encrypted Data Vaults ecosystem
The diagram provides an overview of types of components that are emerging and the roles they play in
different architectures. Encrypted Data Vaults fulfil a storage role. Figure reproduced from [23]
16. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 16/34
3. PHARMALEDGER PLATFORM SPECIFIC RESEARCH
OpenDSU is used as the foundation for all PharmaLedger Use Cases and intermediates the usage of
blockchains. We have identified a set of confidentiality methods that heavily impacts (helps)
confidentiality of the PharmaLedger Use cases.
Table 2 Confidentiality methods and impact for the Pharmaledger Use Cases
# Method Confidentiality Impact
#1 Cryptographically
validated code
The OpenDSU architecture has an important impact on the confidentiality
and security of the platform. The security model, based on data encryption
but code signing, can lead to leaks of information about the type of DSUs
used, impacting privacy.
#2 Zero access
blockchain
anchoring
On-chain data storage is minimized to anchors (which generally contain
secure cryptographic information hashes - enough entropy). This minimizes
the amount of information available to other participants in the blockchain
network.
#3 Symmetric
encryption
All DSUs are stored on servers in the form of symmetrically encrypted bricks.
Each brick is encrypted with a unique randomly generated key. In this way
the sensitive data from the point of view of confidentiality are protected
against reading and correlations. Symmetric encryption is also used for
communication between OpenDSU wallets.
#4 Multiple
blockchain
domains and
Decentralized
Gateway
Architecture(DGA)
OpenDSU support for multiple blockchain domains and DGA architecture
can be seen as an architecture that supports data segregation, in such a way
as to minimize metadata correlation attacks.
#5 Pluginisable DID
methods,
Validation
Strategies
OpenDSU allows the addition of DID methods (but also other methods for
identifying actors, such as X.509 certificates, be they individuals or
organizations) The Validation Strategies concepts allow finding the
appropriate level of compromise between confidentiality and auditability.
#6 OpenDSU
Cryptographic
Methods
OpenDSU is extensible, being based on the idea of code signed and
anchored in a ledger. This approach allows the gradual introduction of new
cryptographic techniques to protect confidentiality.
The OpenDUS methods are synthesized in the table below and are documented in the subchapters as part
of the current research status of task D3.4.
17. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 17/34
3.1. Confidentiality methods directly obtained from the OpenDSU Architecture
The OpenDSU architecture offers a number of methods for obtaining confidentiality and privacy.In the
following table e present an overview of the most important methods offered by OpenDSU.
Table 3: OpenDSU Confidentiality methods summary
OpenDSU feature Benefit sought
Cryptographically validated code By signing the code, the responsibility can be clearly assigned.
For example, in the case of supply chain attacks it will be easy to
detect the initiator of such an attack. Even if the supplier was
itself a victim of a successful attack, the responsibility
assignment will put pressure on the business to consider doing
the best development methods. By using digital signatures and
proper management of credentials, OpenDSU aims to raise the
bar on managing code from the responsibility point of view.
These aspects will have an indirect but clearly positive effect on
confidentiality and can be considered a powerful confidentiality
method.
Zero access blockchain anchoring OpenDSU anchoring minimizes the amount of data and
metadata available in a public ledger. Various strategies for
anchoring are currently being researched as part of the T3.3 task
(Blockchain platform adaptation).
Symmetric encryption DSUs are encrypted using Symmetric encryption
Encrypted messages As documented in the deliverables related to tasks T3.3, T3.4 and
T3.9OpenDSU offers the possibility to transmit encrypted
messages between wallets. The transmission of encrypted
messages is one of the most important pillars of ensuring the
confidentiality of communication in PharmaLedger systems.
Multiple Blockchains The PharmaLedger architecture based on the existence of
several blockchains is in itself a method of achieving
confidentiality by restricting access to metadata associated with
transactions (anchors, transaction completion times or
transaction patterns).
Support for lightweight clients One of the relevant privacy issues in most systems that use
blockchain is that they need a gateway that mediates
communication between wallets (which we can see as
blockchain lightweight clients) and blockchain. These gateways
are unavoidable and relatively harmless in an enterprise
environment but can severely affect the confidentiality of users
18. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 18/34
OpenDSU feature Benefit sought
e.g. patients who do not have their own blockchain nodes and
trusted gateways to communicate securely. OpenDSU tries to
offer a DGA architecture therefore reducing the risk of a single
gateway obtaining metadata or even real data.
Pluginisable DID methods OpenDSU allows the integration of code libraries that implement
any kind of DID method. Different DID Methods provide different
privacy characteristics. This allows the application developers to
choose the DID methods that ensure the right balance between
trust, auditability and privacy.
Validation Strategies OpenDSU is agnostic in terms of the data validation method. In
this deliverable we explain the difference between validation
and verification as well as the fact that OpenDSU allows the use
of different technologies and standards to obtain data
validation.
Open/extensible architecture Because OpenDSU is based on the idea of having signed code and
signed data stored in Data Sharing Units, we are confident that
the OpenDSU architecture will allow for the further integration
of new privacy techniques.
3.2. Confidentiality attacks on the PharmaLedger platform
In the following table we have documented the current understanding of the actors within the
PharmaLedger use cases and their role in jrelevant to confidentiality. The identification of the actors
allows us to carry out a risk analysis and specify the types of confidentiality methods required in
PharmaLedger. This identification will be elaborated within task T3.4.
Table 4: Actor impacting confidentiality
Actors impacting confidentiality
GDPR typical actors
Data owner Typically, are users: People that have a limited access to
sensitive data are enlarging their access) or companies.
Data controller As they determine the purposes of the data collection and
how it will be processed they can impact confidentiality e.g
by sharing confidential data with entities that may exploit,
add, modify or delete data.
Data processor Typically, that get restricted access to confidential(private)
data from data controllers. They could do reverse
19. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 19/34
Actors impacting confidentiality
engineering and deanonymization attacks to reveal
attributes of confidential transactions even in (partially)
encrypted data, by analysing meta-data such as size and
updating frequency of files.
Developers
Actual programmers Backdoors in code to undermine security or authentication
methods.
People or organisation controlling the
external dependencies (libraries with
code, hardware) - supply chain
stakeholders
They can add backdoors in code to undermine security or
authentication methods.
Infrastructure
Communication or computation
Infrastructure providers
They can remove or add data, particularly in the absence
of mechanisms that guarantee immutability. Intercept or
manipulate unencrypted messages in transit, spy or
manipulate unencrypted resting data.
IT (operational) personnel They can abuse their rights to remove or add data,
particularly in the absence of mechanisms that guarantee
immutability. They can install systems to automatically
intercept or manipulate unencrypted messages in transit,
spy or manipulate unencrypted resting data.
Internal attackers: from employees,
family members with physical access to
devices
Get hold of user-managed keys that grant access to
confidential data, as well as unencrypted data stored on
local devices.
State actors Because of their large areas of influence, we can consider
them infrastructure providers
Other actors
External attackers An attacker is a person or organisation that succeeds in
getting access to confidential data without any special
permission from users or data controllers.
In the following table we have identified the types of attacks on confidentiality that are relevant in the
PharmaLedger use cases. Identifying the category of attacks allows us to conduct a risk analysis and specify
the types of confidentiality methods required in PharmaLedger. This identification will be elaborated and
documented within the next update of task T3.4.
20. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 20/34
Table 5: types of attacks on confidentiality that are relevant in the PharmaLedger use cases.
Data leakages attacks
Security attacks: Unauthorized access to confidential data obtained by exploiting bugs or faults
Side channel attacks: Data leakages are hidden in normal looking activities.
Social engineering attack: Unauthorized access obtained through social engineering
Privacy attack: A system issue is breaching the expectations of the laws (e.g. GDPR)
Supply chain attacks: Unauthorized access to confidential data using as vector of attack libraries and
dependencies
Impersonation attacks
Impersonation: An attacker gets access and control over an identity (e.g. to a private keys) and use it
in malicious ways
Deanonymization attacks
Correlation attacks: External attackers create profiles for persons or companies
Timing attacks: Recovery of PII based on correlation with external records and matches based on
simultaneity of events
Crowd anonymity failures: Deanonymization happens because only a reduced number of persons can
produce an event and the simple existence of the information about the event identifies the originator
of the event
Attacks to the credibility of the confidentiality method
Political/Business drawbacks: The confidentiality methods have side effects (for example caused by
leaky/improper abstractions) with potential of creating serious problems in the system exploitation.
Bad user experience or inability to discover the source of a problem during an attack or any system
malfunction could be good examples. Such attacks (even theoretical ones) tend to disqualify a
confidentiality method, even ones that have significant benefits on confidentiality overall.
In the following table we have identified the types of attacks on the confidentiality measure of the
OpenDSU. Identifying these categories of attacks allows us to do a risk analysis and a clarification on the
types of confidentiality methods required in PharmaLedger. This identification will be elaborated within
the task T3.4 and documented in the next deliverable.
21. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 21/34
Table 6: Attacks on the confidentiality measure of the OpenDSU
Architecture
Element
Potential attacks Malicious Actors Impact
Cryptographically
validated code
Deanonymization attacks regarding the usage of
credentials, bricks and digital signatures could
potentially impact confidentiality. In practical
terms, it will be possible to determine what code
is used by the patients or health professionals. The
impact is low because the actual data is protected
by strong encryption, only patterns of activity and
some metadata can be derived.
Infrastructure Low
Zero access
blockchain
anchoring
Security attacks are possible against the pseudo
random generators used to obtain the keys (or if
the KeySSIs are using low levels of entropy)
Developers Medium
Symmetric
encryption
Security attacks are possible against the pseudo
random generators used to create keys
Developers,
Infrastructure
Low
Encrypted
messages
Security attacks are possible against the pseudo
random generators used to create keys.
Deanonymization attacks can be conducted by
actors related to the infrastructure providers.
Developers,
Infrastructure
Low
Support for
multiple
Blockchains
Deanonymization attacks can be conducted by
actors related to the infrastructure providers
Infrastructure
Support light
clients
Deanonymization attacks can be conducted by
organising data exchanges between Infrastructure
providers
Developers,
Infrastructure
Low
Pluginisable DID
methods
Security attacks are possible.
Deanonymization attacks are possible.
Developers,
Infrastructure
Low
Validation
Strategies
Security attacks are possible.
Deanonymization attacks are possible.
Developers
Infrastructure
Low
Open/extensible
architecture
Security attacks are possible. Developers Low
In the following table we have identified the mitigation solutions to attacks on confidentiality identified
in the previous tables. The research on the mitigation will be elaborated further within the task T3.4 and
documented in the next deliverable.
22. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 22/34
Table 7: mitigation solutions to attacks on confidentiality identified
Architecture Element Potential mitigations
Cryptographically
validated code
Other active mitigations against correlation attacks can have severe impacts
on the system. All the internal processes around the system should be
documented and audited periodically. This is an area of active research and will
be documented in the next deliverable.
Zero access
blockchain anchoring
Security evaluation of the code and of the architecture, for example analysis of
the types of KeySSI and what entropy that is used. This is an area of active
research that will continue.
Symmetric encryption Security evaluation of the code and of the architecture should be periodically
conducted. This is an area of active research that will continue.
Encrypted messages Security evaluation of the code and of the architecture should be periodically
conducted. This is an area of active research that will continue.
Support for multiple
Blockchains
Security evaluation of the code and of the architecture should be periodically
conducted. The confidentiality impact from selection of the right ledger is
explained in the next chapter. This is an area of active research that will
continue.
Support light clients Security evaluation of the code and of the architecture should be periodically
conducted. This is an area of active research that will continue.
Pluginizable DID
methods
Security evaluation of the code and of the architecture should be periodically
conducted. This is an area of active research that will continue.
Validation Strategies Security evaluation of the code and of the architecture should be periodically
conducted.
This is an area of active research that will continue.
Open/extensible
architecture
Security evaluation of the code and of the architecture should be periodically
conducted. Initial results are presented in chapter 3.5 named “Computation
over encrypted (secret) inputs”. This is an area of active research that will
continue.
3.3. Ledger selection as a confidentiality method
In this section, we describe the results obtained in T3.4 in relation to the problem of choosing the type of
"access gateway" for wallets and applications that use blockchain.
A Distributed Ledger is not located somewhere abstractly in the cloud but under the control of concrete
entities. These entities provide access to a replica of the ledger via a “gateway” controlled by somebody.
External customers can access the blockchain through these "gateways". From this perspective we
identified 3 archetypes of interaction with a distributed ledger:
● CGA (Centralised Gateway Archetype): the clients are trusting a central gateway;
23. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 23/34
○ SL – Single Ledger (a centralised database with a blockchain data structure)
○ DL – other decentralised ledgers
● DGA (Decentralised Gateway Archetype): the clients are asking multiple gateways and
decide who to trust by some sort of voting;
● NGA (NO Gateway Archetype): extends the DGA pattern by enabling a (direct)
communication method between the clients and gateways that prevents any profiling or
censorship attempts by the gateway.
System
Archetype:
Single Ledger -
SL
SL &
Anchoring
Distributed
Ledger - DL
(CFT)
DL &
Anchoring
BFT DL
Gateway
Archetype:
CGA DGA NGA CGA DGA NGA CGA DGA NGA CGA DGA NGA CGA DGA NGA
Latency 1 2 3 1 3 3 2 3 2 2 2 2
1
2
1
2
1
2
Throughput 5 5 3 5 4 2
3
4
3 2 3 3
1
2
1
2
1
2
1
2
Privacy 1 3 5 1 3 5 1 3 5 1 3 5 1 3 5
Censorship
Resilience
1
2
3
4 1
2
3
4 1 4 4 1 4 5 1 4 5
Tamper
Resilience
1 1 1 3 3 3 3 3 3 4 4 4 5 5 5
Auditability 1 1 1
2
3
2
3
2
3
3 3 3 4 4 4 5 5 5
Scale 1
1
2
2
2
3
3
3
4
4 5
The above table provides a rough rating for the effects of a CGA/DGA/NGA gateway archetype on the
previously introduced system archetypes, i.e., different single ledger (SL) and distributed ledger (DL)
types. The rating measures various performance and security properties based on a Likert Scale, ranging
from a value of 1 (red) -- entailing low guarantees regarding the respective property -- up to a maximum
24. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 24/34
value of 5 (green). Values are further scaled relative to the performance of archetype combinations
compared herein: e.g., for the property "Throughput" we assign the lowest values to BFT DLs, indicating
these perform overall worst in our comparisons of this property, as opposed to SLs with CGA-interactions,
which with a rating value of 5 are amongst the top performers in our comparison of this property.
For each of the assessed properties, we treat each archetype in a “black box” fashion, i.e., considering a
specific property we are exclusively concerned about the guarantees that an archetype provides to clients
interacting with it. To this end, we model the service provided by each archetype as an abstract state
machine, composed of a persistent state and a state transition function. We further assume a transaction-
based interaction pattern among clients and the individual stateful archetypes. Clients submit (signed)
arbitrary requests (transactions) to the service, which are input to the state transition function, together
with the service’s current state, and executed in an atomic fashion. Note that for evaluating properties
we limit the concept of privacy to the service’s ability to monitor network-related traffic and perform
correlations to derive information about the attributes of the client. In other words, we do not examine
privacy regarding the contents of the transaction itself.
Analysing the results from our rating estimates we first find that, as a rule of thumb, combinations of
centralized (system and gateway) archetypes generally provide the best possible performance, in terms
of latency and throughput, as illustrated in the following Diagram.
Figure 5: Combination of centralized archetypes
Furthermore, our comparative study shows that, across all system archetypes, the choice of the gateway
archetype is the dominant factor regarding censorship resilience and privacy. Improvements in either of
these properties, however, come at the expense of performance losses due to an increased latency caused
by communicating with multiple gateways (DGA), or the even higher latency penalties originating from
network anonymization (NGA).
25. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 25/34
Figure 6: Comparative of system archetype due to censorship resilience and privacy
In addition, our results demonstrate that tamper resilience and auditability are dependent exclusively on
the system archetype, more specifically its degree of centralization and fault model. SL provides the worst
tamper resilience guarantees, which, however, can be improved when the services state is periodically
anchored in a BFT (public) blockchain.
Figure 7: Tamper resilience and auditability comparative
26. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 26/34
With respect to DL, we estimate that a total ordering across all transactions, even in the crash fault model,
can be considered fairly equivalent with the tamper resilience guarantees of “SL & Anchoring”. Regarding
auditability, “SL & Anchoring” and “DL & Anchoring” exhibit better guarantees compared to their non-
anchored counterparts, and therefore represent more interesting system archetypes with respect to this
property. However, we want to stress the fact that these guarantees are directly dependent on the
anchoring frequency, i.e., how often the services state is anchored on the BFT (public) blockchain.
Depending on the use case of these system archetypes, the auditability guarantees of the aforementioned
approaches may or may not be acceptable.
3.4. Trustless collaborations vs. the cost of auditability
We next set off to contrast the needs with the costs that might impact the selection of a ledger technology
for business use cases emerging from industry. Clearly, global transparency and performant but strict
consistency through blockchains comes at a considerable price for enterprises. That becomes even more
evident when considering that transactions in most use cases are not at all as simple as cryptocurrency
payments. Auditability, on the other hand, is one major objective that industry aims to accomplish in
several use cases, and that can be facilitated by the use of ledger systems. However, even in use cases
where blockchain technologies enable new ways of collaboration between companies or people, the strict
consistency of all data in a ledger might be wasteful and unnecessary. In this section we therefore attempt
to address the seemingly paradoxical question of "how billion-dollar industries might have survived
without blockchains?"
Figure 8 Various constraints regarding auditability and trustless collaboration
In the above table, we identify five areas of potential business cases, and a blockchain architect needs to
select the appropriate ledger for each of them. We grouped these use case areas by their dependence on
the underlying Business Logic. Under the term "Business Logic", we understand business processes that
are represented digitally by smart contract instances, blockchain-related service orchestrations, or
executable choreographies. From the point of auditability, these business processes have more than one
stakeholder, otherwise the usage of blockchains would be questionable. An immediate observation is
that--in most cases--the business logic of a business process does not depend on the state of other
processes. In this regard, processes can have interactions and can be influenced by other external events
27. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 27/34
from the real world, but not have dependencies on digital contents anchored in the blockchain or created
by other blockchain anchored business processes.
These observations make a huge difference in how to choose the ledger and what can be delegated off-
chain to obtain blockchain-specific characteristics without paying the price for a global consensus: for use
cases in the "independent business logic" category, it is feasible to move the validation outside of the
blockchain and therefore to keep the blockchain strategy only for providing a strict order of events, as
required for auditability.
The motivation for developing the OpenDSU concept starts off with the paradigm that having a single
blockchain technology, or one unique blockchain deployment pattern that covers all the use cases of an
industry, is hardly a benevolent or competent advice. Such a strategy will not work, respectively, the price
will be astronomically high. With OpenDSU, we propose a unified approach for the architecture, allowing
us to reuse code where possible, but not fixing the blockchain technologies that can be employed nor the
deployment patterns. Anchoring with OpenDSU can and will be implemented in ledgers that have
different use case tailored capabilities, and that are deployed in different ways. Particularly the
deployment flexibility is of paramount importance, because even with the most advanced privacy-
preserving technology available, the essentially sensible decision is to not share data, anchors, zero-
knowledge proofs, anonymized transactions, etc. if/whenever there is no real business or technical
requirement for sharing. Therefore, the main aim of the OpenDSU approach is to facilitate sharing and
auditability in the best privacy-preserving way.
3.5. Computation over encrypted (secret) inputs
In task T3.4 we have identified the most important cryptographic techniques and tools that could be used
in the development of the platform and use-cases. We list below the techniques that allow working with
algorithms that receive as input secret (confidential) data and produce verifiable results: Homomorphic
Encryption (HE), Multi Party Computation (MPC), Multi Party Storage (MPS), Differential Privacy (DP),
Indistinguishable Obfuscation (IO), Bloom Filters (BF), Cryptographic Accumulators (CA), Zero Knowledge
Proof (ZKP), Digital Signatures (DS), Commitment Schemes (CS).
The table below presents generic use cases in which the concept of executing an algorithm on secret data:
Table 8: generic use cases in which the concept of executing an algorithm on secret data
# Generic Use Case PharmaLedger Use case
#1 Secret voting Possible
(governance)
#2 Revealing at the end voting Existing
(governance)
#3 Public Algorithm running one single secret input and secret
result
Possible
(Protect patients' privacy)
#4 Public Algorithm running on many secret inputs and verifiable
result
Possible
(Protect patients' privacy)
#5 Auditable data validations In most use cases
28. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 28/34
#6 Data validations without ability to do any correlation with the
involved “identities”
Improbable
#7 Secret Algorithm running one single secret input and returning
a secret result
Possible
(e.g., protect IP)
#8 Secret Algorithm running one multiple secret inputs and
returning a secret but verifiable result
Possible
(Get a research result)
#9 Secret Algorithm running one public inputs Improbable
These generic use cases are explained in the table below in terms of the privacy features of the algorithm,
input and result along with cryptographic techniques with the potential to be used as an implementation
solution.
Table 9: the privacy features of the algorithm, input and result
# Algorithm Inputs Inputs Secrecy Result Secrecy Techniques
#1 Voting Multiple Secret Verifiable HE, ZKP
#2 Voting Multiple Secret until end Verifiable MPS, HE, CS
#3 Public Single Secret Secret HE
#4 Public Multiple. Secret Verifiable DP, MPC, BF,
CA, CS
#5 Public Multiple. Secret Public DS, CS (Any)
#6 Public Multiple. Secret Public CS, DS (Special)
#7 Secret Multiple. Secret Public HE
#8 Secret Any Secret Verifiable HE, MPC, CS
#9 Secret Any Public Any IO, CS
Voting algorithms can be clearly identified because we know the typical rules: each voter casts a secret
ballot but the result is public and verifiable. Verifiability refers to the fact that the counting is done
correctly and each participant with the right to vote votes a maximum of once. We differentiate between
29. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 29/34
“revealing at the end voting” and secret voting. It may sometimes be desirable to reveal the votes after
the counting ends so as not to influence the vote during voting but to see at the end how the members
of a group voted.
As examples of public algorithms that require secrecy, we can evidence the tendering algorithms (select
the best bidder) or algorithms that compute the reputation of members.
For secret algorithms we could imagine new algorithms such as deep-learning trained models. Throughout
the project, WP3 partners will communicate with the use cases teams (WP2) and will explain the potential
of using these new cryptographic techniques to improve various confidentiality aspects of the applications
developed within the PharmaLedger platform.
During this reporting period, special attention was paid mostly to issues #4 and #5 related to data
validation and emerging technologies (Decentralized Identities and Verifiable Credentials). In the
following chapters we mainly document this activity. In the next deliverable of this task, we will document
the other research efforts necessary for Pharmaledger use-cases and for example voting in the
governance tools.
Aspects relevant to the PharmaLedger platform IoT use cases are documented mainly in the deliverables
of the T3.9 task to avoid overlapping between deliverables.
3.6. OpenDSU and use cases as choreographies. OpenDSU and ZKP
In the last section, we have identified three major use case categories based on independent business
logic, where blockchains can be employed to solve business problems between multiple companies (i.e,
"choreographies"). However, each of these use case categories implies different constraints regarding
confidentiality and verifiability, as summarized by the following table:
Table 10: Use Case constraints regarding confidentiality and verifiability
Category Confidentiality Verifiability
Small-Group
Choreography
Transactions are visible only between
a small group of partners.
The transactions are auditable periodically
and the incentives for attackers are few.
Trustless Group
Choreography
Not all transactions should be visible to
the group (but some will be).
Incentives for attacks exist.
Human auditability of the data required.
Network
Choreography
The visibility of the transactions should
be minimized as much as possible.
The incentives for attackers are high!
Human auditability is limited to the code.
Consequently, we propose solutions for the enumerated categories as sketched in the following diagram:
30. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 30/34
Figure 9 Appropriate solution for each category
Our proposed solutions include Zero Knowledge Proofs (ZKP), a quite recent and complex approach that
in literature is already often considered as the "silver bullet" for solving blockchain’s privacy issues mainly
because ZKP justifies the price of computations required for validation when delegated to third parties.
However, ZKP validation can be circumvented for the analysed enterprise use cases by anchoring the
computational results once in a blockchain, against which interested parties can validate as needed (cf.
OpenDSU Bluepaper [26]).
Indeed, as a line of research ZKP is attractive and promising future advances. However, ZKP only sounds
generic and a perfect solution when ignoring current risks, scalability issues and difficulties in the strategy
with respect to how to store and share private data. Admittedly, in the absence of evaluating known
boundaries, however, the proposed ZKP concept turns visionary and cannot debunk suspicions of being
mostly a hype. Additionally, ZKP is usually described from a cryptographer's, i.e., a mathematician's, point
of view, who simply would label data as public, private, etc. However, consideration must be given to
other factors, such as from where to get and where to store private and public data; how these
transactions are communicated and in addition, knowing how to manage that complexity., , As the ZKP
concepts usually present some rather abstract primitives on how to integrate these components properly,
these tasks are neither simple nor obvious to solve.
In contrast, the OpenDSU concept we are proposing is aiming to solve these issues in off-chain respectively
near-chain storage as well as in thus required computations, and at the same time OpenDSU is agnostic
to the usage of ZKP. However, OpenDSU is also based on the idea that in most cases ZKP can be avoided
and substituted by more intuitive solutions that are already available. To deepen this discussion a bit
more, there are two major directions in which we could exploit ZKP in the OpenDSU context:
1. Patients/companies could present ZK-based verifiable credentials to give proof to a verifier.
However, ZKP allows the possibility that the holder of a credential can pass this credential on
to another entity/party, for motives of material benefits, obfuscation, etc. . We currently do
not see how this weakness can be solved. Therefore, the usefulness of ZKP is not clear if it is
required to deanonymize the holder, or, if a trusted intermediary is required to guarantee
the unicity in a set of holders.
2. Smart contracts within a small group of companies could theoretically still be secured with
ZKP. However, such a strategy requires keeping data confidential with encryption and
sharing corresponding keys respectively data only with the right members of the group.
Beyond this scenario, ZKP is useful only if the involvement of a third party for validation
purposes is needed. Typically, the third party is creating some useful software and it can
promote and commercially position its solution in some form of “blockchain as a utility”. In
such case data is to be hidden from the third party. OpenDSU can achieve such computational
31. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 31/34
integrity by reducing the role of the third party to just an interaction through a key/value
database with minimal validation (and without ZKP).
In most cases, the DSU-anchoring model [27] of OpenDSU can remove the need for revealing any data to
the software creator or to the utility provider. DSUs move the computation off-chain, that is, in wallets or
agents controlled by participants and not by the utility providers. Anyway, even when employing ZKP, the
computations on encrypted data, i.e., to generate proofs, should be kept off-chain.
We recognize that OpenDSU’s validation made at the anchoring level could not suffice, leveraging as a
major disadvantage the risk of spamming: an attacker could create numerous versions of DSUs to block
the progress of some business processes. In enterprise solutions, this attack will be noticed and the
attacker can be punished. There exist ZKP cases, where off-chain logic involves choreographies between
many companies, which should be able to validate all transactions without revealing data to each other.
The question arises, whether in most situations simpler and safer solutions based on digital signatures
and encryption could be found. These "boring" solutions could suffice for many of the use cases, would
be safer, much simpler to understand and to program. Although ZKP sounds attractive and generally
applicable to all cases, there is a price to pay that it is difficult to estimate a priori. The risks of new and
complex cryptography, but also potential performance issues when scaling to the level of millions/billions
of people/processes, limits the appeal for ZKP usage.
32. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 32/34
4. CONCLUSIONS
This deliverable reflects the current status of the research from T3.4 and may contain unfinished or slightly
incorrect hypotheses and conclusions. In the coming months, these results will be elaborated and sent for
publication, review and scientific/technical validation.
4.1. Risks from excessive properties of the confidentiality methods
It would be naive to neglect the fact that any useful tool can be employed for both, the bad and the good.
By our studies, we arrived at the position that there could be cases in which confidentiality methods can
be undesirable, or even dangerous. That can easily be seen by the obvious cases in which illegal material
may be stored or in which malware networks controlling canters could be implemented using the
confidentiality methods employed for normal use cases. But also, in general, enterprise environments will
weaken the confidentiality methods as a consequence of requirements for clear auditability and ability to
censor and control the company's infrastructure. Therefore, a balanced point of view is necessary when
evaluating confidentiality issues, and we will consider all sides during our further investigations in the
WP3 confidentiality research task.
4.2. Future research
Table 11: Future research
Research Area Observations
Open DSU Usage
patterns
We foresee the potential of developing new guidelines for the OpenDSU
developers based on PharmaLedger use case implementations.
This area is directly correlated with the use cases and we can enumerate
research areas such as:
● Impact of the Key Management on confidentiality
● PharmaLedger Use Case Specific Confidentiality Challenges
● Types of Verifiable Credentials suitable for Use Cases
● Avoidance of the Cloud Agents during integrations
Impact of the
revocation. Privacy
preserving, granular
revocation
Revocation should be supported at all levels of granularity (DIDs, public
keys, credentials, presentations without or with long expiry time). We
should have privacy friendly mechanisms for enabling both, issuer- and
holder-controlled revocations.
IoT specific challenges Documented in T3.9 deliverables.
The main objective of our future research is to provide new tools, guidelines and advice for use case
implementers. This research will continue to draw inputs from the use case development and provide
output for T3.5. Overall, T3.4 task is advancing well considering our relevant research results, interesting
insights, and the proposition of quality solutions for developers.
33. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 33/34
BIBLIOGRAPHY
[1] P. Consortium, “D3.8 Reference implementation of advanced confidentiality methods,”
2021.
[2] P. Consortium, “D3.1 PharmaLedger framework architecture,” 2020.
[3] M. Kubach, C. H. Schunck, R. Sellung and H. Roßnagel, “Self-sovereign and Decentralized
identity as the future of identity management?,” Proceedings of the Open Identity Summit
2020, Lecture Notes in Informatics (LNI) ed., vol. 305, Gesellschaft für Informatik, 2020.
[4] M. Sporny, D. Longley and D. Chadwick, “Verifiable Credentials Data Model 1.0
Recommendation,” Available: https://www.w3.org/TR/vc-data-model/, 19 November
2019.
[5] M. Alblooshi, K. S. and Y. Alhammadi, “Blockchain-based Ownership Management for
Medical IoT (MIoT) Devices,” Proceedings of the 13th International Conference on
Innovations in Information Technology (IIT), IEEE,, pp. 151-156., 2018.
[6] I. Barclay, A. Preece, I. Taylor, S. Radhai and J. Nabrzyski, “Certifying Provenance of Scientific
Datasets with Self-sovereign Identity and Verifiable Credentials,” Proceedings of the 12th
International Workshop on Science Gateways (IWSG), 2020.
[7] H. Halpin, “Vision: A Critique of Immunity Passports and W3C Decentralized Identifiers,”
Proceedings of the 6th International Conference on Research in Security Standardisation:
Security Standardisation Research (SSR), Lecture Notes in Computer Science, 2020.
[8] M. Kubach and H. Roßnagel, “A lightweight trust management infrastructure for self-
sovereign identity,” in Proceedings of the Open Identity Summit 2021, Lecture Notes in
Informatics (LNI) ed., Bonn, Gesellschaft für Informatik, 2021, pp. 155-166.
[9] D. Reed, “Decentralized Identifiers (DIDs) v1.0 Core architecture, data model, and
representations,” https://www.w3.org/TR/2021/CRD-did-core-20210616/, Standard, W3C,
2021.
[10] O. Lassila and R. R. Swick, “Resource Description Framework (RDF) Model and Syntax
Specification, W3C Recommendation.,” no. Available at:
https://www.w3.org/TR/1999/REC-rdf-syntax-19990222, 2021.
[11] J. J. Carroll, “ Signing RDF Graphs,” The Semantic Web - ISWC, vol. Springer Berlin Heidelberg,
p. 369–384., 2003.
[12] D. Chadwick, “Verifiable Credentials implementation guidelines 1.0, W3C
Recommendation,” no. Available at: https://www.w3.org/TR/vc-imp-guide/, 2019.
[13] M. McIntosh and P. Austel, “XML signature element wrapping attacks and
countermeasures,” Proceedings of the 2005 workshop on Secure web services. New York,
NY, USA: Association for Computing Machinery (SWS ’05), p. 20–27, 2005.
[14] M. Hansen and H. Tschofenig, “A Terminology for Talking about Privacy by Data
Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity,
and Identity Management,” Vols. Available at: http://dud.inf.tu-
dresden.de/literatur/Anon_Terminology_v0.34.doc, 2010.
[15] E. Syta, “Private eyes: Secure remote biometric authentication,” 12th International Joint
Conference on e-Business and Telecommunications (ICETE), p. 243–250, 2015.
[16] C. Rathgeb and A. Uhl, “A survey on biometric cryptosystems and cancelable biometrics,”
EURASIP Journal on Information Security, pp. 1-25, 2011.
[17] B. Byfield, “Hide Cloud Data from the Cloud Vendor: Secure Storage with Tahoe-LAFS, Linux
Pro Magazine,” no. Available at:
34. PharmaLedger – 853992 | Deliverable D3.6 v3.1| PUBLIC 34/34
https://www.linuxpromagazine.com/Online/Features/Hide-Cloud-Data-from-the-Cloud-
Vendor, 2014.
[18] E. Mansour, “A Demonstration of the Solid Platform for Social Web ApplicationsSt,”
Proceedings of the 25th International Conference Companion on World Wide Web. Republic
and Canton of Geneva, CHE: International World Wide Web Conferences Steering Committee
(WWW'16 Companion), pp. 223-226, 2016.
[19] M. Ramachandran, “Towards Complete Decentralised Verification of Data with
Confidentiality: Different ways to connect Solid Pods and Blockchain,” Companion
Proceedings of the Web Conference 2020. New York, NY, USA: Association for Computing
machinery (WWW'20), pp. 645-649, 2020.
[20] M. Eisenstadt, “COVID-19 Antibody Test/Vaccination Certification: There’s an App for That,”
IEEE Open Journal of Engineering in Medicine and Biology, vol. 1, p. 148–155, 2020.
[21] D. Buchner, “Identity Hub, Decentralized Identity Foundation (DIF),” no. Available at:
https://github.com/decentralized-identity/identity-hub/blob/main/spec/spec.md, 2021.
[22] D. Buchner, “ Identity Hub Data Encryption and Sharing, Hub Encryption Proposal,” no.
Available at: https://github.com/decentralized-
identity/papers/blob/master/Hub%20Encryption%20Proposal%20-%20Draft%201.pdf,
2019.
[23] D. Longley, “Encrypted Data Vaults 0.1, Encrypted storage for the Web,” no. Available at:
https://digitalbazaar.github.io/encrypted-data-vaults/, 2020.
[24] C. Lemmer Webber, M. Sporny and M. S. Miller, “Authorization Capabilities for Linked Data
v0.3, An object capability framework for linked data systems,” no. Available at: https://w3c-
ccg.github.io/zcap-ld/, 2020.
[25] A. Guy, “Encrypted Data Vaults,” no. Available at:
https://nbviewer.jupyter.org/github/WebOfTrustInfo/rwot9-prague/blob/master/final-
documents/encrypted-data-vaults.pdf., 2019.
[26] S. Alboaie, M. Cuomo, C. N. Ursache, D. Sava, A. Gheorghiu, A. Shah and L. Alboaie, OpenDSU
Bluepaper (Draft 2.0), opendsu.com, 2020.
[27] S. Alboaie and B. Mastahac, “Anchoring,” [Online]. Available:
https://opendsu.com/?openDSU/rfc004.html.