Integrating Blockchain for Securing and Auditing Patient Eligibility Data in CHIP

Authors

  • Sangeeta Anand Senior Business System Analyst at Continental General, USA. Author

DOI:

https://doi.org/10.63282/3050-9246.IJETCSIT-V1I1P107

Keywords:

Blockchain, CHIP, Patient Eligibility, Healthcare Data Security, Smart Contracts, Audit Trail, Distributed Ledger Technology (DLT), Data Integrity, Medicaid, HIPAA Compliance, Permissioned Blockchain, Immutable Records, Healthcare Fraud Prevention, Interoperability, FHIR Standards, Identity Management, Access Control, Transparent Data Sharing, Public Health IT, Secure Data Exchange

Abstract

Disjointed data systems, susceptibility to fraud, and the inadequate transparency provide continuous challenges for these verification of patient eligibility and their audits inside the Children's Health Insurance Program (CHIP). Conventional centralized systems struggle to ensure data integrity, provide timely access control, and they create reliable audit trails qualities that could compromise public trust or service performance. In response to these challenges, this article looks at using blockchain technology to provide a distributed, tamper-proof architecture for preserving patient eligibility information. Leveraging the inherent qualities of blockchain immutability, distributed consensus, and the smart contracts our approach offers a secure, open, and automated solution greatly enhancing auditing and verification processes. Designed and tested under simulated circumstances, a functioning prototype proved able to dynamically enforce too many access rules, produce verifiable audit trails, and prevent illicit data changes free from more reliance on a central authority. The findings highlight how this paradigm improves data security and builds confidence among the many other stakeholders including regulatory authorities, payers, and healthcare providers including those of Furthermore, the blockchain-based solution indicates its scalability across state and federal programs as it fits with present legislative efforts aiming at updating healthcare IT infrastructure. Emphasizing the requirement of secure, transparent, and the patient-centered data management models to build a more resilient and more responsible healthcare system, this study offers a reasonable framework for employing the latest technologies in public health administration

Downloads

Download data is not yet available.

References

[1] Blobel, Bernd, et al. "Securing interoperability between chip card based medical information systems and health networks." International Journal of Medical Informatics 64.2-3 (2001): 401-415.

[2] Sater, Stan. "Blockchain transforming healthcare data flows." Available at SSRN 3171005 (2018).

[3] Prakash, Ramkrishna. "Adoption of blockchain to enable the scalability and adoption of accountable care." ONC/NIST Use of Blockchain for Healthcare and Research Workshop. Gaithersburg, Maryland, United States: ONC/NIST. 2016.

[4] Kupunarapu, Sujith Kumar. "AI-Enabled Remote Monitoring and Telemedicine: Redefining Patient Engagement and Care Delivery." International Journal of Science And Engineering 2.4 (2016): 41-48.

[5] Ahram, Tareq, et al. "Blockchain technology innovations." 2017 IEEE technology & engineering management conference (TEMSCON). IEEE, 2017.

[6] Uddin, Md Ashraf, et al. "Continuous patient monitoring with a patient centric agent: A block architecture." IEEE Access 6 (2018): 32700-32726.

[7] Sangaraju, Varun Varma, and Senthilkumar Rajagopal. "Danio rerio: A Promising Tool for Neurodegenerative Dysfunctions." Animal Behavior in the Tropics: Vertebrates: 47.

[8] Uddin, Md Ashraf, et al. "A patient agent to manage blockchains for remote patient monitoring." Transforming Healthcare Through Innovation in Digital Health. IOS Press, 2018. 105-115.

[9] Banerjee, Mandrita, Junghee Lee, and Kim-Kwang Raymond Choo. "A blockchain future for internet of things security: a position paper." Digital Communications and Networks 4.3 (2018): 149-160.

[10] Ekblaw, Ariel Caitlyn. MedRec: blockchain for medical data access, permission management and trend analysis. Diss. Massachusetts Institute of Technology, 2017.

[11] Ferrer, Eduardo Castelló, et al. "Robochain: A secure data-sharing framework for human-robot interaction." arXiv preprint arXiv:1802.04480 (2018).

[12] Sreedhar, C., and Varun Verma Sangaraju. "A Survey On Security Issues In Routing In MANETS." International Journal of Computer Organization Trends 3.9 (2013): 399-406.

[13] Canim, Mustafa, Murat Kantarcioglu, and Bradley Malin. "Secure management of biomedical data with cryptographic hardware." IEEE Transactions on Information Technology in Biomedicine 16.1 (2011): 166-175.

[14] Ali, Muhammad Salek, et al. "Applications of blockchains in the Internet of Things: A comprehensive survey." IEEE Communications Surveys & Tutorials 21.2 (2018): 1676-1717.

[15] Sangaraju, Varun Varma. "Ranking Of XML Documents by Using Adaptive Keyword Search." (2014): 1619-1621.

[16] Blackford, William J. "Hashing it Out: Blockchain as a Solution for Medicare Improper Payments." Belmont L. Rev. 5 (2018): 219.

[17] Blackford, William J. "Hashing it Out: Blockchain as a Solution for Medicare Improper Payments." Belmont L. Rev. 5 (2018): 219.

[18] Yasodhara Varma Rangineeni, and Manivannan Kothandaraman. “Automating and Scaling ML Workflows for Large Scale Machine Learning Models”. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), vol. 6, no. 1, May 2018, pp. 28-41

[19] Pulkkis, Göran, Jonny Karlsson, and Magnus Westerlund. "Blockchain‐Based Security Solutions for IoT Systems." Internet of things A to Z: technologies and applications (2018): 255-274.

[20] Coperich, K., E. Cudney, and H. Nembhard. "Blockchain Technology Innovations." Proceedings of the 2017 Industrial and Systems Engineering Conference. 2017.

Published

2020-03-30

Issue

Section

Articles

How to Cite

1.
Anand S. Integrating Blockchain for Securing and Auditing Patient Eligibility Data in CHIP. IJETCSIT [Internet]. 2020 Mar. 30 [cited 2025 Sep. 12];1(1):57-65. Available from: https://ijetcsit.org/index.php/ijetcsit/article/view/260

Similar Articles

1-10 of 235

You may also start an advanced similarity search for this article.