• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    HealthyBlockchain for Global Patients

    2021-12-11 13:31:54ShadaAlsalamahHessahAlsalamahThamerNouhandSaraAlsalamah
    Computers Materials&Continua 2021年8期

    Shada A.Alsalamah,Hessah A.Alsalamah,Thamer Nouh and Sara A.Alsalamah

    1College of Computer and Information Sciences,King Saud University,Riyadh,11451,Saudi Arabia

    2Digital Health and Innovation,Science Division,World Health Organization,Geneva,CH-1211,Switzerland

    3MIT Department of Mechanical Engineering,Massachusetts Institute of Technology(MIT),Cambridge,02139,MA,USA

    4College of Engineering and Architecture,Al Yamamah University,Riyadh,11451,Saudi Arabia

    5Trauma and Acute Care Surgery Unit,College of Medicine,King Saud University,Riyadh,11451,Saudi Arabia

    6College of Computer and Information Sciences,Al Imam Mohammad Ibn Saud Islamic University,Riyadh,13318,Saudi Arabia

    Abstract:An emerging healthcare delivery model is enabling a new era of clinical care based on well-informed decision-making processes.Current healthcare information systems(HISs)fall short of adopting this model due to a conflict between information security needed to implement the new model and those already enforced locally to support traditional care models.Meanwhile, in recent times, the healthcare sector has shown a substantial interest in the potential of using blockchain technology for providing quality care to patients.No blockchain solution proposed so far has fully addressed emerging cross-organization information-sharing needs in healthcare.In this paper,we aim to study the use of blockchain in equipping struggling HISs to cope with the demands of the new healthcare delivery model, by proposing HealthyBlockchain as a granular patient-centered ledger that digitally tracks a patient’s medical transactions all along the treatment pathway to support the care teams.The patient-centered ledger is a neutral tamper-proof trail timestamp block sequence that governs distributed patient information across the decentralized discrete HISs.HealthyBlockchain connects patients,clinicians,and healthcare providers to facilitate a transparent, trustworthy, and secure supporting platform.

    Keywords: Blockchain; eHealth; electronic health record; global patient;healthcare information system; information security; legacy system;patient-centered care; privacy; smart contract; trust

    1 Introduction

    Emerging eHealth models are enabling a new era of clinical care that ignites today’s global modernization movement toward an individualized, holistic, and integrated healthcare delivery model.This model of care requires the flow of medical information across various healthcare information systems (HISs) to allow its seamless access by the right care team member at the right time.Various studies in the literature reveal that current HISs interrupt patient treatment continuity, which makes them unsuitable for an individualized model of care.This results from a conflict between the information security goals needed for this new model and those already attained and enforced locally as part of the traditional disease-centered healthcare delivery models.This compromises the availability of the required medical information and places high pressure on healthcare providers to incorporate their HISs while addressing emerging privacy and information security concerns.Meanwhile, blockchain, which has been described as the “most promising technology” in today’s technology realm because of the hype and optimism it has generated as an enabler of a new technological revolution, has given rise to a new generation of asset transactional applications [1].Although most of its applications in the literature have been limited to cryptocurrencies and financial services, a wave of interest in blockchain for various other digital sectors has notably been increasing over the last couple of years, especially in the healthcare space [1-5].Characterized as a peer-to-peer (P2P) distributed ledger technology, blockchain facilitates the tracking of assets among participants in a decentralized network [4].At the heart of a blockchain resides trust, which is established to address consensus in entrusted networks, ensure robustness,and facilitate value migration in a decentralized manner [3].

    Although several solutions have been proposed to manage legacy information systems (LISs)in general, and healthcare systems in particular [6,7], few studies have explored the use of blockchain to equip legacy HISs beyond theory.However, these solutions fall short of addressing legacy HISs’heterogeneity and inconsistency challenges.Moreover, they do not equip legacy HISs to seamlessly implement modern healthcare delivery models while maintaining their autonomous security policies and access control models.This is the gap in the literature that we intend to address in this study.We aim to study whether blockchain can enhance the ability of struggling discrete and legacy HISs to cope with the emerging cross-organizational information-sharing needs of the modern healthcare movement, which is an important aspect of delivering better patient experience and care.We believe that this topic has not been comprehensively investigated in the literature.The remainder of this paper is organized as follows.Section 2 introduces the reader to modern healthcare services.Section 3 discusses the data-sharing and protection dilemma emerging from modern eHealth services, whereas the fundamentals of blockchain technology are presented in Section 4.In Section 5, we outline the literature dealing with the use of blockchain solutions in healthcare.Section 6 presents the methodology implemented for this project.Section 7 illustrates the design of the HealthyBlockchain and a thorough analysis of how HealthyBlockchain can potentially address the challenges faced by HISs.Section 8 discusses the clinical adoption of the HealthyBlockchain.Finally, in Section 9, we present our conclusions.

    2 Modern Healthcare

    One of the early definitions of patient-centered care can be found in [8]:

    “A collaborative effort [...] where patients and the healthcare professionals collaborate as a team, share knowledge and work toward the common goals of optimum healing and recovery.”

    As part of the global adoption of patient-centered care over the last couple of decades [9-11],patient treatment has shifted from a traditional [9], fragmented disease-centered approach toward an integrated individualized one [10-14].Emerging healthcare models have utilized information communication technology (ICT) to enhance collaboration, communication, and coordination in the health sector [15,16] to provide a holistic view of the patient’s condition [14,17].This approach puts the patient at the heart of these healthcare services and integrates and tailors care around the patient’s needs and current state [10,11,18,19].While traditional disease-centered care models emphasize record keeping [18], the patient-centered approach creates a “culture of open information” [19] emphasizing accessibility to patient information [18], teamwork and collaboration [14], and shared decision-making through regular multi-disciplinary team reviews [13,19].The shift from disease-centered to patient-centered healthcare is illustrated in Fig.1.

    Figure 1:Shift from disease-centered care to one that is patient-centered [20]

    The digital transformation of healthcare using emerging technologies, such as ICT, cloud computing, Internet of Things (IoT), and mobile and wearable devices, has the potential to enhance health outcomes by improving medical diagnosis, data-based treatment decisions, digital therapeutics, clinical trials, self-management of care, and person-centered care, as well as create more evidence-based knowledge, skills, and competence for professionals to support health care.Electronic Healthcare (eHealth) plays an increasingly significant role in shaping modern healthcare in such areas as mobile health (mHealth), ubiquitous healthcare (uHealthcare), telemedicine,and virtual healthcare.Regardless of the technology used, these models mainly aim to connect healthcare providers, clinicians, and patients to enable a seamless flow of medical information between healthcare settings to virtually form a complete electronic patient record for making informed decisions.Furthermore, they facilitate the global movement toward a holistic, integrated,and patient-centered healthcare delivery model (also known as individualized care [21], or shared care [12]) [15,18,22,23].Such a shift is introduced to enable “a new era of clinical care [...]that empower patients, researchers, and providers to work together toward the development of individualized care” [21].

    3 Data-Sharing vs.Protection Dilemma

    According to Cancer Center’s Caldicott Guardian Crosby [24], “More harm is done to the patient if his information is not available to the care team member when needed than it falling into the wrong hands.” Hence, sharing patient data across heterogeneous HISs so that it is accessible to other care teams is fundamental for the successful implementation of the new patient-centered care model [25,26].Nonetheless, the World Health Organization (WHO) Global Strategy on Digital Health 2020-2025 [27] classifies health data as sensitive personal data or personally identifiable information, which emphasizes the need for a strong legal and regulatory base to protect the privacy, confidentiality, and integrity of personal health data and to deal with cybersecurity, trust building, accountability and governance, ethics, equity, capacity building, and data literacy issues.This is to ensure that good-quality data are collected and subsequently shared to support planning, commissioning, and transformation of services.Therefore, shared care in multiple healthcare provider settings puts acute pressure on healthcare providers to address emerging privacy and security concerns, making trust management (TM) one of the most challenging issues in this area due to the open and anonymous nature of digital environments [26,28].This anonymous nature of our digital world undoubtedly demands reliable, trustworthy health systems and applications that can ensure that shared care is implemented securely.Information security in the context of healthcare information systems implies that only the right medical information is available to the right care team member at the right point in time [29].This is also owing to the complicated system of global legislation that the healthcare providers must comply with.These laws include, but are not limited to, the Data Protection Act [30], Access to Health Records Act [31], Computer Misuse Act [32], Human Rights Act [33], the Health Insurance Portability and Accountability (HIPPA) Act [34], Caldicott Guardian Principles [35], the European General Data Protection Regulation (GDPR) [36], and the New York State Department of Financial Services’mandatory cyber security requirements [37].They collectively aim to articulate how personal patient information must be handled and provide clear rules on how any processing of such information in a cross-system shared care environment should be carried out and controlled.For instance, according to the Data Protection Act 1998, Caldicott Guardian Principle 4 implementation in the UK clearly states that:“Access to patient identifiable information should be on a strict need-to-know basis” [35], and the GDPR emphasizes the patient’s consent is the basis for any data processing [38], whereas the major goal of HIPPA’s Privacy Rule implemented in the US is to:“Assure that individuals’health information is properly protected while allowing the flow of health information needed to provide and promote high-quality healthcare and to protect the public’s health and wellbeing” [39].Therefore, healthcare providers who share patient information with other team members across their information systems have no option but to carefully balance between making the right medical information available to the right user whenever needed and maintaining information confidentiality.

    Healthcare is an increasingly data-driven domain [6] that suffers from a growing collection of legacy systems, networks, and applications [6,10,29,40].These legacy systems are often brittle,slow, and non-extensible discrete legacy information systems [29].Such legacy systems are typically the backbone of the patient care flow, and their failure can have a serious impact on patients’care [7].Furthermore, healthcare providers cannot afford to discard these systems as they contain historical medical data based on an aging population [29]; therefore, global efforts to modernize health care systems, including in the United Kingdom, favor an evolutionary approach over a revolutionary one that involves using legacy systems so that they are gradually replaced with newer systems [7,11,13,19,40,41].Bisbal et al.[7] define an LIS as “any information system that significantly resist modification and evolution” [7].In addition, this evolutionary approach is less expensive and has a lower risk of failure compared with alternative approaches [7], where the legacy systems are totally discarded and replaced with newer ones, which can have a serious impact if the information becomes unavailable or lost.Hence, it is important not to discard a legacy system, but rather to evolve it [7,10,40].Therefore, it is not surprising that the transformation from legacy systems supporting a traditional approach to systems supporting patient-centered care is a concrete challenge the UK National Health Service (NHS) is facing [13,42].Data in the old format are stored in standalone information silos and need to be converted into the format required by the new integrated support systems [42].The evolutionary movement in the NHS is based on the principle of “keeping what works and discarding what has failed” [10].This implies that new integrated systems are built on the foundations of fragmented LISs [10].Nonetheless,enabling information-sharing across healthcare providers with legacy systems without doubt poses several information security risks that threaten the effectiveness, dynamism, and potential of this collaboration.This has been evidenced by results from a study [29] conducted in 2016 to evaluate healthcare systems’readiness for patient-centered care at the Velindre Cancer Center [43].Velindre, one of the largest NHS divisions and cancer centers in the UK with an annual budget of over £49 million, provides specialist cancer services to over 1.5 million people in South East Wales and beyond [43].Using domain analysis, conceptual modeling, and 12-h observation of current practices, as well as semi-structured interviews, this study investigated three different types of cancers in-depth:hepatocellular, upper gastrointestinal, and breast cancers [29].The results show that the studied healthcare systems fall short of meeting the minimum requirements of modern healthcare delivery models because of the availability, integrity, and confidentiality of medical information being seriously compromised, as shown in Tab.1 [44].Furthermore, the above threats result in legacy systems blocking the flow of medical information (see Fig.2) [45].This is because, first, the legacy systems were designed to meet the traditional disease-centered model [29],and hence, they cannot enforce their policies outside of their physical boundaries.Second, they lack a clear information security policy to govern exchanged patient-centered information at the collaboration level across those healthcare providers’systems.

    Table 1:Information security threats posed by health care legacy systems [29]

    4 Blockchain Technology:The“Internet of Individuals”[46]

    Blockchain technology is being celebrated as an enabler of a new technological revolution [1].Defined as “a peer-to-peer distributed ledger technology for a new generation of transactional applications that establishes transparency and trust.” [4], Blockchain is adistributed and sustainableledger, not a database solution, which istransparent and auditable, as it digitally tracks asset transactions between a group of networked peers.The ledger also provides a transparent tamperproof trail of timestamps of block sequences that are algorithmically self-policed to supportsecure,private,and indelibletransactions.This shifts the information-Internet into a value-Internet by addressing consensus in trustless networks, ensuring robustness, and facilitating value migration in a decentralized manner [3].Thisconsensus-based and transactionalinfrastructure helps support end-to-end processes in anorchestrated and flexiblemanner.

    Figure 2:Health care legacy systems are blocking medical information flow [45]

    Blockchain technology holds the potential to reconfigure human activity in a new disruptive computing paradigm [47].In a World Economic Forum survey dated September 2015, 58% of all survey respondents said that they expected that by 2025, 10% of global gross domestic product will be stored using blockchain technology [5].This anticipated revolution can be categorized into three waves:Blockchains 1.0, 2.0, and 3.0 [47].The deployment of cryptocurrency, blockchain 1.0,was the first wave of change.Blockchain 2.0 is the next evolution of technology that enables decentralized smart contract systems.The more recent wave of interest, blockchain 3.0, demonstrates the technology’s application beyond currency.The remainder of this section addresses the fundamentals of blockchain to highlight its potential to be harnessed in the healthcare domain.

    The fundamental components underlying blockchain technology are distributed peer-to-peer networks, digital transactions, and shared ledgers [48].In a blockchain a group of distributed participants are linked by a peer-to-peer communication network, where each participant houses an identical copy of the blockchain and contributes to its governance.It issecure, private, and indelibleas participants reference each other via their public keys, and use their private key to cryptographically sign transactions.Blockchain also supports aconsensus-based and transactionalledger in which digital transactions refer to the assets to be maintained by the blockchain, which are recorded into a shared ledger.The inclusion of new transactions into the ledger requires consensus and confirmation of participants based on a set-upon verification process.Once verified,the new transaction is propagated to all the copies of the blockchain.Transactions in the ledger have a timestamp and a unique cryptographic hash, which makes the ledger a verifiable history of the transactions in the network.

    The data structure of a blockchain is an ordered sequential chain of cryptographic hashlinked blocks of digital transactions.Each block is identified by a cryptographic hash and timestamp.Each block is also linked back to the previous block, i.e., the parent block, in the chain.The hash of the parent chain is maintained in each referencing block’s header, thus linking each block to its parent and achieving a temporal ordering of transactions up to the genesis block(first block in a blockchain).Any change in the identity of the parent necessitates a change in the referencing block and hash that cascades throughout the blockchain.This ensures that the history of the blockchain remains immutable [49] through an orchestrated and flexible blockchain ledger with a lifetime process history.

    The architecture of a blockchain can be categorized as either permissionless (i.e., public),permissioned (i.e., semi-public or consortium), or private.Public blockchains, such as Bitcoin [50],are often large and decentralized, where participants at any level can engage in the blockchain.Therefore, a public blockchain is completely trustless, where none of the participants are given special privileges.In permissioned blockchains, which are partially decentralized, participation can be controlled; however, permissioned blockchains are viewable to the public.Compared with public blockchains, networks utilizing a permissioned architecture have low latency and high storage capacity.A private blockchain, on the other hand, is privately shared by a trusted organization and is not viewable to the public.Transactions are quicker compared with other architectures,with almost no latency, as they are verifiable by fewer participants.

    The exchange of information between participants in a blockchain is governed by a decentralized consensus.This consists of a series of standards and rules that direct transactional contributions or exchanges to ensure an unambiguous, immutable ordering of transactions to guarantee the integrity and consistency of the blockchain among trustless participants in a scalable setting [47].In a permissionless architecture, any participant can take part in the consensus process, whereas a consortium of participants in a permissioned or private architecture governs the consensus process.As the nature of blockchain transactions varies, various models are used for creating consensus.The choice of a consensus model is often dependent on the expected threat to the network and the degree of trust in the participants operating the blockchain.For instance, Bitcoin operates a consensus model called “proof of work” to prevent malicious attacks on trade histories and permissionless ledgers.Several other consensus models have been proposed,for example, proof of stake, variants, and hybrid.The efficacy of a consensus model is determined by three key properties:safety, liveness, and fault tolerance.A consensus model guarantees safety by maintaining a consistent shared state, liveness by producing a consensus from non-faulty participants, and fault-tolerance by recovering from a participant’s failure [51].

    Immutability is one of the defining features of blockchain technology.The immutability mechanisms of blockchain also imply that they are auditable, as the authenticity of every transaction is recorded in the blockchain.This means that blockchain design supports a systematic and independent examination of transactions to determine their temporal validity and thus enforce accountability [52].For instance, Bitcoin’s economic accountability is made possible via its proof-of-work consensus model, which makes corruption prohibitively expensive and immediately detectable, which means the Bitcoin is tamper-resistant [51].A transaction’s audit trail further supports provenance tracking, where the history of ownership, source, or origin is transparent and tractable.One of the earliest applications of blockchain for the provenance tracking of physical goods was the provenance of diamonds [53].

    5 Related Work

    ICT is enabling an emerging generation of intelligent healthcare delivery models that are integrated, holistic, personalized, and even mobile [44].However, patient-centeredness requires informed decision-making processes that are shared among care providers.This can only be achieved through seamless access to relevant siloed information held in discrete electronic medical record (EMR) systems [44].Nevertheless, current systems fall short because of their heterogeneity and inconsistencies across EMR systems in terms of security policies and access control models [44].Blockchain technology is seen as offering promising possibilities for the healthcare sector.Although few studies have explored the potential of blockchain in healthcare, there still are a number of promising proposals that may contribute to enabling personalized care through blockchain-based EMR solutions.Azaria et al.[54] proposed MedRec to overcome the existing barriers to effective cross-organizational information-sharing caused by legacy HISs or traditional EMR systems.This should eventually address miscommunication issues between patients and healthcare providers; this is to prioritize a patient’s involvement in their care and reduce direct third-party involvement.MedRec handles a unified patient-centered EMR using a decentralized blockchain-based record management system, integrated with the patient’s healthcare providers.Using permission management, it sustains and secures the network via proof-of-work by various medical stakeholders with the incentive to become blockchain miners.As a reward, MedRec provides access to aggregated and anonymized data.The proof-of-work algorithm is based on a trustless model that is used to secure the content from tampering, where individual nodes must compete to solve computations before the next block unit is added.This creates a comprehensive,immutable, accessible log to the patient’s medical information across providers and treatment sites.Concei??o et al.[55] proposed the implementation of an integrated blockchain-based largescale architecture to access EMRs.They utilize a blockchain smart contract to enable secure access to EMRs.Abdelkhalek et al.[56] suggested a roadmap to improve the performance of EMR using blockchain in the health sector.The authors suggested connecting all health facilities to a unified network using blockchain technology.The road map touched many technical and non-technical aspects that should be considered, including improving the current EMR, unifying medical terminologies, introducing awareness programs to public and medical societies, and developing laws, legislations, and health procedures.Tanwar et al.[57] proposed an access control policy architecture and algorithm to facilitate access to EMRs, supporting the simulation of environments to implement the hyperledger-based EMR sharing system that uses the concept of a chain-code.

    Furthermore, Yue et al.[58], AlOmar et al.[59], and Xia et al.[60] revolutionized EMR systems by enforcing tighter security countermeasures for access control.Yue et al.[58] proposed a healthcare data gateway (HGD) as a blockchain solution that gives patients control and access rights to their medical data.Access in HGD is more controlled than in MedRec because it is based on a stricter purpose-based information access scheme.The EMRs in HGD are managed using a blockchain-based storage system that authenticates all data access requests based on a purpose-centered information security principle.In addition, it utilizes a secure multiparty computation (MPC) mechanism to allow third parties to process patient data without risking patient privacy.Meanwhile, AlOmar et al.[59] proposed MediBchain, which is similar to HGD in that it revolutionizes EMR systems by using secure countermeasures for authentication, but with an extra focus on the identification of participants.Xia et al.[60] proposed MeDShare,which adds an extra layer of protection by monitoring entities that access data for malicious use from a data custodian system.This is achieved by employing smart contracts and an access control mechanism to effectively track the data behavior.Although the solutions may vary in their approach or security aspect, they share commonalities in terms of the content and type of blockchain used.All frameworks aim to store transactions in relation to a patient’s medical information that needs to be accessed to make an informed decision about the best treatment options.This blockchain is distributed among EMR systems at various healthcare settings based on permissioned blockchain solutions that allow access to only invited, and hence verified, users.This complies with the information security and data protection laws and regulations for medical records [58].

    6 Methodology

    Using a mixture of qualitative research methods, we, first, conceptually modeled the information flow between different treatment points along a well-defined and globally accepted breast cancer treatment pathway and implemented using business process modeling.This pragmatic approach was necessary to fully understand the challenges posed by LISs, as we had to define a scope while using real systems to achieve our goals.Second, we studied the implementation of individualized care using current discrete information systems.Third, we identified the challenges hindering the full implementation of the discrete information system by mapping the results with the conceptual model.Finally, we designed a blockchain that would address these challenges and equip the LISs to fully implement personalized care.The results of the above steps can be found in multiple publications (for details, see [44,45]).This paper focuses on the final step, as explained in the following section.

    7 HealthyBlockchain:Refurbishing Health Care Services Using Blockchain Technology

    A block is the smallest unit in a blockchain, and is conceptually similar to a database primary index.A block does not store the data, but keeps track of where data can be found.Therefore,it is effectively a bookkeeper of all the treatment points that the patient is undergoing.As the patient goes down his or her treatment plan, each block is initiated and completed by a single care team member, and links back to a previous block within the list (i.e., a chain in our context).All blocks within a patient’s chain should have the same data structure.Each block unit represents a new transaction of value (patient medical information collected or processed in a treatment in this context) and has ablock headerandblock content.The block header keeps track of the blockchain details to relate this block to the chain whereas the block content keeps track of the patient’s medical information generated at each treatment point.This information is then associated with the layers of metadata to put the details of the treatment point in context.The metadata details include the team member originating from this treatment point, treatment session details, the hospital where this information has been collected and processed, and, finally, the owner keys details (see Fig.3A).

    To implement an access control model that can govern the patient data on HealthyBlockchain at the global level, an 8-level fine-grained information classification scheme is designed, as illustrated in Fig.3B.

    Access control authorization is managed through public and private keys.HealthyBlockchainmanages the private and public keys of each patient’s care team members in the following two scenarios.

    Private Data-Sharing:This scenario aims to share information privately between two specific health care professionals, let us say between a patient’s general practitioner (GP) and her psychologist after the recent suicide attempt by the patient.The GP does not want to share the patient’s personal and psychological details with her surgeon.Hence, the GP uses the psychologist’s public key to sign the report and pass it along to the psychologist, who then decrypts the report using his private key.

    Public Data-Sharing:This scenario aims to share information publicly with the remaining care team members while clearly showing the report originator (i.e., owner) for ensuring data integrity and authenticity.In this scenario, the GP would like to share with her care team the details of a recent follow-up visit at his clinic after the patient has successfully completed a treatment plan.The GP uses the GP’s public key to decrypt the report and see it.

    Figure 3:(A on the left) Anatomy and granularity of HealthyBlockchain’s unit of block.(B on the right) Fine-grained information classification scheme of eight layers for HealthyBlochain data governance

    Fig.4 illustrates an instance of a HealthyBlockchain that is patient-centered in action and digitally signed by each care team member with their private key before releasing to the patient’s blockchain following the patient-specific treatment pathway.Eventually, the sequence of blocks is added into a ledger presents the complete scenario.

    Putting It All Together

    HealthyBlockchain uses private and permissioned blockchains, the former to comply with jurisdictional, international health data protection acts and the latter to implement role-based accessed control to allow only those participants allowed to write on the blockchain.The Healthy-Blockchain backend solution comprises two key components:a local hospital information system for off-chain data and a patient-centered ledger for on-chain data (see Fig.5).The former component handles the off-chain data stored in the local EMRs by the care team all along the treatment plan.Once a record is created or updated in the local hospital information system, the smart contract is invoked to create a new treatment transaction record based on the treatment point details following the information classification scheme.

    Figure 4:HealthyBlockchain in action and digitally signed by each care team member with their private key before releasing it to the remaining care team to validate the new treatment transaction(block unit) before it is added to the patient’s blockchain sequence

    In this paper, we proposeHealthyBlockchainas a fine-grained, comorbidity-oriented, patientcentered ledger that digitally tracks each patient’s medical transactions along all followed treatment pathways and for all the involved care teams while they keep using their local systems.At each treatment point, a block with 8-levels of granularity is automatically generated with a description of the recorded information in the local system on a digitally signed block.This is to provide a unified block sequence for patients with tamper-proof trail time-stamps, which is a neutral, conflict-free information policy implemented through a smart contract that governs patient-centered information across decentralized ledgers.HealthyBlockchainconnects patients,clinicians, and healthcare providers to facilitate a transparent, trustworthy, and secure patientcentered healthcare delivery model required to cope with the demands of today’s global patient healthcare needs.This should be incorporated into this modernization movement rather than being a burden that needs to be discarded; this is intended to build a better quality of care for a better tomorrow.See Fig.6 below.

    Figure 5:HealthyBlockchain software components and data flow

    As identified earlier, the information security threats posed by healthcare legacy systems include:integrity, availability, and confidentiality (explained in section three).HealthyBlockchain addresses these threats as follows (and summarized in Tab.2):

    Information Integrity.Preserving the accuracy of patient medical information systems is one of the challenges in LISs.Restoring the right level of information integrity to suit modern care delivery, medical information needs to be organized in a chronological order so that owners can track the origin of invalid information resulting from a human error incident and act upon it.HealthyBlockchain is transparent and auditable, as all transactions and participants are verified in near real time when a block is added.Thus, transactions are time-stamped and tamper-proof and are represented in a block sequence, each representing a treatment point.Moreover, an important requirement in the healthcare domain is that medical data collected along patient treatment points should never be deleted; it simply has to become a part of the medical history.This is owing to the fact that this data are the basis for treatment decisions and hence any required updates to this data will imply going back to all decisions made on invalid data and trying to fix it.Therefore,any updates made to the data need updating the history to track the timeline.HealthyBlockchain is secure, private, and indelible in this regard as all medical history and decisions made based on them are recorded and never deleted.In addition to the treatment details, each block is digitally signed by the care team member participating as the owner to ensure the authenticity of the data provided.Validation following any signed block implies that everyone will be aware of all updates to a particular patient’s data, leaving very little scope for human error not being spotted.This is also recorded in the HealthyBlockchain ledger that summarizes the chronological order of treatments and care team members involved without the need for any replications in different systems, which may cause inconsistencies.

    Figure 6:Incorporating blockchain technology into patient-centered care movement

    Information Availability.Access to medical information across distributed and heterogeneous hospital legacy systems is currently not supported in HISs.Therefore, a common collaborationdriven information access to overarching local organization-driven policies is required.Healthy-Blockchain is distributed and sustainable, which allows access to medical information through its neutral decentralized consensus.

    It is also orchestrated and flexible to include historical lifetime treatment stages and support end-to-end treatment flow.Information security policies within the medical information legacy system are also inconsistent, which also hinders information-sharing.HealthyBlockchain governs the visibility of the medical information, according to the permission rules set by its owner, as it is secure, private, and indelible.It uses cryptographic techniques to present selected views of the ledger to participants and to the fine-grained layers in each block.

    Table 2:HealthyBlockchain addressing threats posed by health care legacy systems

    A consistent information organization that provides a patient-centered holistic view and allows easy access to patient clinical information is needed within the modern healthcare delivery landscape.Within HealthyBlockchain, this is supported by the data structure of the ordered sequential chain of cryptographic hash-linked blocks.Each block is also linked with a cryptographic hash and time stamp.Moreover, the sequence of the blocks is added into a shared ledger, which provides a lifetime history of all transactions.Thus, the ledger within the distributed and sustainable HealthyBlockchain is comorbid-oriented and presents the full picture of each patient’s medical case.Further, the gathering and filtering of relevant information to avoid overwhelming the care team members with irrelevant information is required to increase the chances of finding the right information at the right time.HealthyBlockchain allows participants to join the chain as its architecture permits this, and each participant governs the visibility of the information they add through the smart contract, including the owner’s key details.This could also be filtered throughout the 8-layers of granularity within each block.The resilience of emergency cases is a crucial requirement that speeds up access to information for decision-making in a life-or-death situation.The central point of information governance within HealthyBlockchain supports the release of the private keys as the emergency case requires.This is again controlled by having a consensus-based and transactional blockchain to grant access as per the situation and also a transparent and auditable blockchain that tracks every transaction.HealthyBlockchain does not address automated referral among different healthcare providers with the right information.However, it is proposed as a future work through the use of business process management to support predefined clinical pathways.

    Information Confidentiality.Common collaboration-driven information access needs define the line between the two conflicting information security goals:availability and confidentiality.The comorbid-oriented and fine-grained digitally signed block by care team members supports this in the HealthyBlockchain.

    Information security policy awareness in a culture of open information is required to raise the awareness of care team members in terms of how to look at another member’s information so as to help preserve the confidentiality of shared information.The digital signature supports hospital-wide access control, whereas the smart contract supports it across hospitals.This is due to the transparency and auditability of HealthyBlockchain for in-house information exchange, and the orchestrated and flexible platform is supported by the HealthyBlockchain for cross-organizational exchange.

    8 Clinical Adoption of HealthyBlockchain

    Healthcare providers utilize multiple IT solutions to deliver medical care (documentation,laboratory, imaging).Information is exchanged freely between these systems within the confines of the healthcare provider following an information security policy that allows free flow of information between systems while protecting aggregated medical information from external threats and maintaining access to healthcare providers according to their security privileges.Although this system works well, it might benefit from blockchain technology.There is a clear need for the incorporation of HealthyBlockchain in healthcare when the patient moves from one level of care to another that is external to the security zone of his/her healthcare provider.When the patient moves from primary to secondary, tertiary, or quaternary care, the medical information is currently not well shared and is through a written medical report or the patient’s verbal narrative.The difficulties faced by the healthcare system with this approach is that a medical report“summarizes” all the medical data in a couple of pages, and this does not grant the receiving provider access to all of the original data (physician documentation, nursing documentation,imaging, laboratory, pathology), wherein there is a deficiency in the medical report or further information that was not included in the medical report is needed.Moreover, relying on the patient’s account provides another challenge as patients differ in their ability to communicate the correct information based on their understanding, memory, preference, or benefit.To overcome this, many healthcare providers and institutions rely on evaluating the patient as if new to the system, having to redo many of the assessments because of their inability to access the patient’s file from the previous institution and driven mostly by genuine patient care needs and sometimes to address potential medicolegal areas of care.

    HealthyBlockchain can eliminate these security concerns as it allows the seamless flow of clinical information from the security zone of one care provider to the other in a secure traceable manner.This will cause a massive reduction of waste in healthcare expenses and the prevention of potential complications, delays, and mismanagement due to the lack of information flow, by maintaining the patient at the center of healthcare without compromising information security.One of the very important concerns in the HealthyBlockchain process relates to the control of the blockchain.HealthyBlockchain can be designed to be controlled by healthcare providers,payers, patients, or the government (if not in the roles of provider or payer).Each option has its advantages and drawbacks.Ideally, the provider generates a blockchain for a patient’s entire medical record.The control for allowing other health care providers (institutions or individual physicians) would be with the patient.In this way, patients are empowered and assured that their medical information is accessible by legit care providers, and the providers can conveniently access the medical record its entirety without any constraints on the selection of information.

    9 Conclusions

    This paper asserts the blockchain technology to be an enabler for the transformation of the healthcare sector rather than a hindrance if the migration is conducted with the absolute minimum risk.HealthyBlockchain has been proposed to support collaboration among healthcare providers in modern healthcare with the use of legacy systems.HealthyBlockchain could act as a top layer to evolve their operation to support distributed, secure, consensus-based, transparent, and flexible transactions across healthcare organizations.We propose the HealthyBlockchain architecture to illustrate how it will operate technically with the existing infrastructure.In terms of the clinical adoption of HealthyBlockchain, we describe the flow of data among software components to address integrity, availability, and information security threats within legacy healthcare systems.Regardless of technological hiccups, blockchain has every opportunity, with minimal risks, to transform the health of aging nations and to facilitate limitless personalized care to patients globally.

    Funding Statement:This work received funding from Ibn Khaldun Fellowship for Saudi Women in partnership with the Center for Clean Water and Clean Energy at MIT, and the Deanship of Scientific Research at King Saud University through research Group No.RG-1438-002.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美日韩精品网址| 成人亚洲欧美一区二区av| 最近最新中文字幕大全免费视频 | 老鸭窝网址在线观看| 午夜av观看不卡| 最黄视频免费看| 黄频高清免费视频| 毛片一级片免费看久久久久| 大片电影免费在线观看免费| 香蕉国产在线看| 91aial.com中文字幕在线观看| 国产成人欧美在线观看 | 亚洲国产欧美一区二区综合| 精品久久久久久电影网| 天美传媒精品一区二区| 久久久久久人人人人人| 欧美最新免费一区二区三区| 日韩制服骚丝袜av| 中文字幕精品免费在线观看视频| 亚洲伊人色综图| 国产一区二区三区综合在线观看| 99热国产这里只有精品6| 观看美女的网站| 精品亚洲成国产av| 欧美黑人欧美精品刺激| 欧美精品一区二区免费开放| 午夜免费鲁丝| 伊人久久大香线蕉亚洲五| 日本黄色日本黄色录像| 国产麻豆69| av卡一久久| 自线自在国产av| 精品酒店卫生间| 观看av在线不卡| 校园人妻丝袜中文字幕| 伊人久久大香线蕉亚洲五| 亚洲中文av在线| 日本午夜av视频| 亚洲精品久久午夜乱码| 亚洲精品国产区一区二| 久久久国产精品麻豆| 中文字幕人妻熟女乱码| 咕卡用的链子| 欧美在线黄色| 国产成人精品久久久久久| 久久久久视频综合| 美女国产高潮福利片在线看| kizo精华| 最黄视频免费看| 国产成人免费无遮挡视频| 丝袜在线中文字幕| av有码第一页| 亚洲成国产人片在线观看| 女人爽到高潮嗷嗷叫在线视频| 亚洲国产欧美日韩在线播放| 岛国毛片在线播放| 国产97色在线日韩免费| 午夜激情av网站| 欧美变态另类bdsm刘玥| 在线观看免费日韩欧美大片| 综合色丁香网| 国产深夜福利视频在线观看| 大话2 男鬼变身卡| 欧美精品av麻豆av| 国产精品免费视频内射| 亚洲人成网站在线观看播放| 欧美人与性动交α欧美精品济南到| 亚洲色图综合在线观看| 免费黄网站久久成人精品| 人人妻人人澡人人爽人人夜夜| 亚洲伊人久久精品综合| 欧美日韩av久久| 日韩精品免费视频一区二区三区| 在线观看免费日韩欧美大片| 色播在线永久视频| 高清在线视频一区二区三区| 男的添女的下面高潮视频| 中国三级夫妇交换| 国产精品一区二区精品视频观看| 国产成人一区二区在线| 一区二区av电影网| 亚洲精品日本国产第一区| 久久国产精品男人的天堂亚洲| 纵有疾风起免费观看全集完整版| 丰满乱子伦码专区| 国产精品一二三区在线看| 亚洲久久久国产精品| 99精品久久久久人妻精品| 久久韩国三级中文字幕| 亚洲国产看品久久| 大香蕉久久成人网| 咕卡用的链子| 欧美97在线视频| 久久免费观看电影| 国产1区2区3区精品| 人人妻,人人澡人人爽秒播 | 久久人妻熟女aⅴ| 大码成人一级视频| 久久久久久免费高清国产稀缺| 在线天堂中文资源库| 国产精品秋霞免费鲁丝片| 99久久99久久久精品蜜桃| 女人高潮潮喷娇喘18禁视频| 1024视频免费在线观看| 91精品国产国语对白视频| 十八禁高潮呻吟视频| av.在线天堂| 久久久国产一区二区| 亚洲欧美精品综合一区二区三区| 欧美激情极品国产一区二区三区| 国产精品人妻久久久影院| 黄色视频在线播放观看不卡| 精品人妻熟女毛片av久久网站| 成人国产麻豆网| 国产在视频线精品| 免费在线观看完整版高清| 欧美日韩一级在线毛片| 亚洲一区中文字幕在线| 国产在线视频一区二区| 精品午夜福利在线看| 亚洲欧美精品综合一区二区三区| 五月开心婷婷网| 日日撸夜夜添| 久久人人爽人人片av| 亚洲成av片中文字幕在线观看| 亚洲欧洲国产日韩| 欧美日韩精品网址| 日韩熟女老妇一区二区性免费视频| 国产成人免费观看mmmm| 亚洲三区欧美一区| 免费高清在线观看日韩| 久久久久人妻精品一区果冻| 欧美日韩亚洲高清精品| 中文天堂在线官网| 91精品伊人久久大香线蕉| 国产精品麻豆人妻色哟哟久久| 日韩av不卡免费在线播放| 成人漫画全彩无遮挡| 在线亚洲精品国产二区图片欧美| 狠狠婷婷综合久久久久久88av| √禁漫天堂资源中文www| 亚洲三区欧美一区| 免费观看人在逋| 中文字幕色久视频| 飞空精品影院首页| 美女大奶头黄色视频| 综合色丁香网| 国产xxxxx性猛交| 久久免费观看电影| 欧美日韩国产mv在线观看视频| 国产一区有黄有色的免费视频| 亚洲国产欧美一区二区综合| 国产成人av激情在线播放| 丝瓜视频免费看黄片| 男女之事视频高清在线观看 | av网站在线播放免费| 国语对白做爰xxxⅹ性视频网站| 婷婷色av中文字幕| 另类亚洲欧美激情| 欧美在线一区亚洲| 亚洲国产中文字幕在线视频| 大片免费播放器 马上看| 国产精品蜜桃在线观看| 97精品久久久久久久久久精品| www.自偷自拍.com| 国产毛片在线视频| 看十八女毛片水多多多| 欧美在线一区亚洲| 99精品久久久久人妻精品| 免费不卡黄色视频| 亚洲国产欧美在线一区| 一本色道久久久久久精品综合| 搡老乐熟女国产| 十八禁人妻一区二区| 欧美少妇被猛烈插入视频| 丰满少妇做爰视频| 中文字幕亚洲精品专区| 尾随美女入室| 日本欧美视频一区| 日韩一区二区视频免费看| 久久精品aⅴ一区二区三区四区| 丝袜美腿诱惑在线| 黄片无遮挡物在线观看| 国产一区二区三区av在线| √禁漫天堂资源中文www| 国产免费一区二区三区四区乱码| 性色av一级| 人妻一区二区av| 制服诱惑二区| 人人妻人人添人人爽欧美一区卜| 亚洲精品第二区| 久久亚洲国产成人精品v| 国产黄色免费在线视频| 一级毛片电影观看| 欧美日韩精品网址| 亚洲成av片中文字幕在线观看| 国产成人免费观看mmmm| 超碰97精品在线观看| 女人久久www免费人成看片| 大片电影免费在线观看免费| 99久久人妻综合| 中文天堂在线官网| 国产在视频线精品| av有码第一页| 亚洲情色 制服丝袜| 免费黄频网站在线观看国产| 亚洲天堂av无毛| 2021少妇久久久久久久久久久| 18禁国产床啪视频网站| 又粗又硬又长又爽又黄的视频| 婷婷色av中文字幕| 一级,二级,三级黄色视频| 久久国产亚洲av麻豆专区| h视频一区二区三区| 日韩精品有码人妻一区| 麻豆乱淫一区二区| 久久精品国产亚洲av高清一级| 精品一区二区三区av网在线观看 | 天堂中文最新版在线下载| 可以免费在线观看a视频的电影网站 | 亚洲精品在线美女| 国产成人精品在线电影| 可以免费在线观看a视频的电影网站 | 1024香蕉在线观看| 日本一区二区免费在线视频| 99久国产av精品国产电影| 欧美老熟妇乱子伦牲交| 99热国产这里只有精品6| 最近手机中文字幕大全| 日韩 欧美 亚洲 中文字幕| 天天躁夜夜躁狠狠久久av| av片东京热男人的天堂| 日韩免费高清中文字幕av| 蜜桃在线观看..| 美女主播在线视频| 建设人人有责人人尽责人人享有的| 最近中文字幕2019免费版| 国产高清国产精品国产三级| 日韩精品免费视频一区二区三区| 亚洲一级一片aⅴ在线观看| 蜜桃国产av成人99| 制服丝袜香蕉在线| 国产成人a∨麻豆精品| 国产又色又爽无遮挡免| av网站在线播放免费| 成年av动漫网址| 日韩人妻精品一区2区三区| 国产成人a∨麻豆精品| 久久天堂一区二区三区四区| 久久久国产一区二区| 飞空精品影院首页| 欧美亚洲 丝袜 人妻 在线| 欧美国产精品va在线观看不卡| 国产探花极品一区二区| 久久影院123| 丝袜喷水一区| 亚洲国产av新网站| 狠狠精品人妻久久久久久综合| 老鸭窝网址在线观看| 欧美乱码精品一区二区三区| 亚洲精品美女久久av网站| 国产成人啪精品午夜网站| 久久精品国产a三级三级三级| 91国产中文字幕| 日本欧美国产在线视频| 99国产综合亚洲精品| 制服人妻中文乱码| 日韩欧美一区视频在线观看| 可以免费在线观看a视频的电影网站 | 午夜福利,免费看| 成人国产av品久久久| www.av在线官网国产| av一本久久久久| 少妇精品久久久久久久| 精品久久久久久电影网| 熟妇人妻不卡中文字幕| 欧美日韩一级在线毛片| 丝袜在线中文字幕| 制服诱惑二区| 久久久精品区二区三区| 十八禁人妻一区二区| 亚洲精品日本国产第一区| 国产精品一区二区在线观看99| 天堂8中文在线网| 久久狼人影院| 久久久久视频综合| 丝袜喷水一区| 中国三级夫妇交换| 乱人伦中国视频| 一区在线观看完整版| 久久久久国产精品人妻一区二区| 成人毛片60女人毛片免费| 久久青草综合色| 久热爱精品视频在线9| 国产精品久久久久久精品电影小说| 久久天堂一区二区三区四区| 久久久精品国产亚洲av高清涩受| 中文字幕高清在线视频| 天天躁狠狠躁夜夜躁狠狠躁| 精品国产一区二区久久| 青春草国产在线视频| 亚洲av日韩在线播放| 一级毛片我不卡| 久久鲁丝午夜福利片| 亚洲精品国产色婷婷电影| 男人添女人高潮全过程视频| 啦啦啦在线观看免费高清www| 久久久久久久国产电影| 亚洲美女黄色视频免费看| 777久久人妻少妇嫩草av网站| 免费观看av网站的网址| 色播在线永久视频| 亚洲国产日韩一区二区| 精品一区在线观看国产| 女人高潮潮喷娇喘18禁视频| 免费在线观看黄色视频的| 另类精品久久| 国产极品天堂在线| 国产精品99久久99久久久不卡 | 一区二区三区乱码不卡18| 国产一区二区三区综合在线观看| 成人18禁高潮啪啪吃奶动态图| 久久久精品免费免费高清| 亚洲av福利一区| 一个人免费看片子| 性少妇av在线| 熟妇人妻不卡中文字幕| av免费观看日本| 久热爱精品视频在线9| 欧美在线一区亚洲| 亚洲四区av| 国产av码专区亚洲av| 国产1区2区3区精品| 捣出白浆h1v1| 欧美久久黑人一区二区| 免费看不卡的av| www.精华液| 国产精品香港三级国产av潘金莲 | 久久久久网色| 国产伦人伦偷精品视频| 亚洲国产欧美网| 亚洲中文av在线| 天堂8中文在线网| 黄片小视频在线播放| 国产人伦9x9x在线观看| 赤兔流量卡办理| 男女边吃奶边做爰视频| 久久精品熟女亚洲av麻豆精品| 久久久久国产一级毛片高清牌| 免费黄频网站在线观看国产| 操美女的视频在线观看| 自线自在国产av| 国产极品粉嫩免费观看在线| 晚上一个人看的免费电影| 波多野结衣一区麻豆| 日韩中文字幕欧美一区二区 | 91老司机精品| 亚洲精华国产精华液的使用体验| √禁漫天堂资源中文www| 日韩一区二区视频免费看| 亚洲精品国产一区二区精华液| 美女中出高潮动态图| 大片电影免费在线观看免费| 日韩视频在线欧美| 亚洲国产欧美在线一区| 国产又爽黄色视频| 国产男人的电影天堂91| 国产xxxxx性猛交| 色综合欧美亚洲国产小说| 少妇精品久久久久久久| 久久久久视频综合| 日本欧美视频一区| 午夜激情久久久久久久| 欧美97在线视频| 欧美日韩亚洲国产一区二区在线观看 | 女的被弄到高潮叫床怎么办| 日本av免费视频播放| 亚洲精品中文字幕在线视频| 日本av免费视频播放| 婷婷成人精品国产| 美女主播在线视频| 狠狠精品人妻久久久久久综合| 又大又黄又爽视频免费| www.自偷自拍.com| 日韩一卡2卡3卡4卡2021年| 高清在线视频一区二区三区| 亚洲免费av在线视频| 天天躁狠狠躁夜夜躁狠狠躁| 大码成人一级视频| 久久狼人影院| 国产亚洲午夜精品一区二区久久| 国产午夜精品一二区理论片| 国产精品一区二区在线不卡| 免费在线观看完整版高清| 精品第一国产精品| 久久精品国产亚洲av涩爱| 国产av国产精品国产| 性高湖久久久久久久久免费观看| 亚洲婷婷狠狠爱综合网| 国产有黄有色有爽视频| 日本欧美国产在线视频| 欧美精品一区二区大全| 久热爱精品视频在线9| 欧美亚洲 丝袜 人妻 在线| 啦啦啦啦在线视频资源| 日本午夜av视频| 久久人人97超碰香蕉20202| 亚洲伊人久久精品综合| av在线老鸭窝| 国产男女内射视频| 久久精品aⅴ一区二区三区四区| 男女国产视频网站| 人妻一区二区av| 亚洲色图综合在线观看| 久久女婷五月综合色啪小说| 亚洲欧美清纯卡通| 男女免费视频国产| 国产精品一区二区精品视频观看| 国产极品天堂在线| 国产一级毛片在线| 亚洲av成人精品一二三区| 91成人精品电影| 午夜激情久久久久久久| 国产又色又爽无遮挡免| 精品一区二区三区av网在线观看 | 日韩成人av中文字幕在线观看| 欧美激情极品国产一区二区三区| 精品卡一卡二卡四卡免费| 国产熟女欧美一区二区| 中文乱码字字幕精品一区二区三区| 母亲3免费完整高清在线观看| 国产精品国产三级国产专区5o| 一区在线观看完整版| 老熟女久久久| 国产一区亚洲一区在线观看| 久热这里只有精品99| 成人漫画全彩无遮挡| 黄色视频不卡| 99久久综合免费| 一级毛片黄色毛片免费观看视频| 曰老女人黄片| 大香蕉久久成人网| 天天躁夜夜躁狠狠躁躁| 国产精品亚洲av一区麻豆 | 天美传媒精品一区二区| 久久精品人人爽人人爽视色| 国语对白做爰xxxⅹ性视频网站| 久久99一区二区三区| 久久人人爽人人片av| 欧美人与性动交α欧美精品济南到| av线在线观看网站| 中文精品一卡2卡3卡4更新| 免费看不卡的av| 国精品久久久久久国模美| 中文欧美无线码| 女人被躁到高潮嗷嗷叫费观| 亚洲国产av影院在线观看| 男女午夜视频在线观看| 亚洲av成人精品一二三区| 久久久久久久大尺度免费视频| 久久性视频一级片| 日韩一区二区三区影片| 一级片免费观看大全| 9热在线视频观看99| 欧美精品一区二区大全| 国产精品久久久久成人av| av有码第一页| 丰满迷人的少妇在线观看| 国产一区二区激情短视频 | av国产精品久久久久影院| 黑丝袜美女国产一区| 五月天丁香电影| 亚洲av国产av综合av卡| 伊人久久大香线蕉亚洲五| 777米奇影视久久| 国产精品国产av在线观看| 黄色怎么调成土黄色| 国产av精品麻豆| 国产精品一区二区精品视频观看| 欧美日韩一级在线毛片| 精品国产一区二区三区四区第35| 我的亚洲天堂| 狠狠婷婷综合久久久久久88av| 少妇 在线观看| 国产精品成人在线| 国产亚洲精品第一综合不卡| 国产亚洲最大av| 美女高潮到喷水免费观看| 老司机亚洲免费影院| 国产av码专区亚洲av| 亚洲欧美中文字幕日韩二区| 亚洲一卡2卡3卡4卡5卡精品中文| 国产一区有黄有色的免费视频| 久久午夜综合久久蜜桃| 天天添夜夜摸| 一级黄片播放器| 国产欧美日韩综合在线一区二区| 国产精品麻豆人妻色哟哟久久| 精品一区在线观看国产| 90打野战视频偷拍视频| 国产黄色视频一区二区在线观看| 日韩精品有码人妻一区| 精品一品国产午夜福利视频| 久久99热这里只频精品6学生| 精品国产一区二区三区久久久樱花| 中文乱码字字幕精品一区二区三区| 只有这里有精品99| 国产亚洲av片在线观看秒播厂| √禁漫天堂资源中文www| www.av在线官网国产| 国产老妇伦熟女老妇高清| 一区二区三区精品91| 97在线人人人人妻| av天堂久久9| 国产在线一区二区三区精| 国产 一区精品| 狠狠精品人妻久久久久久综合| 又粗又硬又长又爽又黄的视频| 久久久精品免费免费高清| 亚洲欧洲精品一区二区精品久久久 | 午夜福利网站1000一区二区三区| 如何舔出高潮| 2018国产大陆天天弄谢| 欧美激情极品国产一区二区三区| av女优亚洲男人天堂| 美女主播在线视频| avwww免费| 国产1区2区3区精品| 男的添女的下面高潮视频| 三上悠亚av全集在线观看| 亚洲国产欧美在线一区| 亚洲精品美女久久av网站| 五月天丁香电影| 婷婷色综合大香蕉| 久久婷婷青草| 男男h啪啪无遮挡| 男的添女的下面高潮视频| 亚洲专区中文字幕在线 | 九草在线视频观看| a 毛片基地| 人人妻人人澡人人看| 80岁老熟妇乱子伦牲交| 99久久99久久久精品蜜桃| 日韩大码丰满熟妇| 极品少妇高潮喷水抽搐| 国产精品女同一区二区软件| 精品免费久久久久久久清纯 | 伦理电影大哥的女人| 黄色视频在线播放观看不卡| 亚洲av成人精品一二三区| 国产午夜精品一二区理论片| 丰满少妇做爰视频| 中文欧美无线码| 天天影视国产精品| 日日爽夜夜爽网站| 男女边摸边吃奶| 亚洲国产精品国产精品| 成人影院久久| 国产伦人伦偷精品视频| 晚上一个人看的免费电影| 国产激情久久老熟女| 成人亚洲精品一区在线观看| 日韩一区二区三区影片| 爱豆传媒免费全集在线观看| 老汉色av国产亚洲站长工具| 老司机在亚洲福利影院| 人人妻人人澡人人看| 免费看不卡的av| 一本大道久久a久久精品| 哪个播放器可以免费观看大片| 国产淫语在线视频| 亚洲国产欧美网| 在线观看免费日韩欧美大片| 国产免费又黄又爽又色| 少妇猛男粗大的猛烈进出视频| 亚洲精品自拍成人| 十八禁高潮呻吟视频| 观看美女的网站| 亚洲精品aⅴ在线观看| 18禁观看日本| www.熟女人妻精品国产| 欧美日韩亚洲综合一区二区三区_| 亚洲精品国产区一区二| 国产激情久久老熟女| 天天添夜夜摸| 亚洲一区二区三区色噜噜| 午夜久久久在线观看| 极品教师在线免费播放| 麻豆久久精品国产亚洲av| 法律面前人人平等表现在哪些方面| 一个人免费在线观看的高清视频| 久久精品91蜜桃| 亚洲精品国产一区二区精华液| 琪琪午夜伦伦电影理论片6080| 久久香蕉精品热| 精品午夜福利视频在线观看一区| 久久久国产精品麻豆| 亚洲国产高清在线一区二区三 | 高潮久久久久久久久久久不卡| 欧美在线一区亚洲| 亚洲精品一区av在线观看| 日韩大尺度精品在线看网址 | 大型黄色视频在线免费观看| 丰满人妻熟妇乱又伦精品不卡| 国产精品精品国产色婷婷| 成人特级黄色片久久久久久久| 人妻久久中文字幕网| 免费高清在线观看日韩| 999精品在线视频| 成人18禁在线播放| 搡老妇女老女人老熟妇| 黑人巨大精品欧美一区二区蜜桃| 国产精品一区二区在线不卡| 国产成人精品无人区| 国产男靠女视频免费网站|