(3) We have used the “keccak256” function built into Solidity. This function takes an input and converts it into a hash with a fixed length of 256, making the data provided by patients and doctors highly confidential.
(3) Authors discussed about many variations of EHR’s security [9].
(4) Patients and doctors will both benefit. Every service under our system will be faster than under the current system.
(4) Some EHR systems need more time to update the information. Sometimes, the system needs more electricity to run the server. It is expensive [20].
(5) We have used secured databases to monitor every footprint on the web. It will be stored on the server in a hash. So, no one can temper the medical data easily. It Is under smart contracts.
(5) The system is controlled by the admin. Sometimes, records cannot be undone. So, its footprint is so strong that it finds the bad side of the system [7].