Table 2 Comparison between ACHealthChain and related work from privacy, security, and attack resistance perspectives.

From: ACHealthChain blockchain framework for access control and privacy preservation in healthcare

Reference

Confidentiality

Integrity

Availability

Decentralized

Accountability

Revocability

Scalability

UAA

DoS

EA

DY

SA

MedRec22

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

MeDShare23

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\hbox {MediChain}^{TM}\)24

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

Healthchain25

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

SPChain26

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

BCHealth27

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

Xiang and Zhao28

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

Diaz et al.29

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

Lax et al.30

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

ACHealthChain

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

  1. Attack resistance columns: UAA=Unauthorized Access Attempts, DoS=Denial of Service Attack, EA=Eavesdropping Attack, DY=Dolev-Yao Model Attack, SA=Sybil Attack