1
|
Fateminasab SS, Bahrepour D, Tabbakh SRK. A novel blockchain-based clustering model for linked open data storage and retrieval. Sci Rep 2025; 15:5931. [PMID: 39966404 PMCID: PMC11836340 DOI: 10.1038/s41598-024-81915-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/25/2024] [Accepted: 11/29/2024] [Indexed: 02/20/2025] Open
Abstract
In recent years, organizations have increasingly adopted blockchain technology to facilitate the open sharing of data with other entities. However, despite its potential benefits, blockchain-based open data models face several challenges, including scalability, timely access, and privacy concerns. This paper introduces a Novel Blockchain-based Clustering Model for Linked Open Data Storage and Retrieval called BCLOD to address these challenges. Initially, network nodes are organized into clusters, and transactions from users within each cluster are then grouped into a proposed linked block specific to that cluster to preserve linked open data property. Additionally, we introduce a new partial block structure, which stores parts of the linked block. To enhance scalability and trustworthiness, we propose the structures of partial and full chains in BCLOD for storing the linked and the partial blocks. Furthermore, a two-layer Role-Based Access Control (RBAC) mechanism is introduced to safeguard user privacy. To validate the effectiveness of BCLOD, we conduct evaluations using various scenarios. The results demonstrate a significant reduction in the required storage space for both partial and full chains when compared to the traditional blockchains. Besides, BCLOD prevents fork occurrences and potential attacks such as Sybil, Distributed Denial of Service (DDoS), and Eclipse.
Collapse
Affiliation(s)
| | - Davoud Bahrepour
- Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran.
| | | |
Collapse
|
2
|
Aslam A, Postolache O, Oliveira S, Pereira JD. Securing IoT Sensors Using Sharding-Based Blockchain Network Technology Integration: A Systematic Review. SENSORS (BASEL, SWITZERLAND) 2025; 25:807. [PMID: 39943446 PMCID: PMC11820452 DOI: 10.3390/s25030807] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/02/2024] [Revised: 01/10/2025] [Accepted: 01/13/2025] [Indexed: 02/16/2025]
Abstract
Sharding is an emerging blockchain technology that is used extensively in several fields such as finance, reputation systems, the IoT, and others because of its ability to secure and increase the number of transactions every second. In sharding-based technology, the blockchain is divided into several sub-chains, also known as shards, that enhance the network throughput. This paper aims to examine the impact of integrating sharding-based blockchain network technology in securing IoT sensors, which is further used for environmental monitoring. In this paper, the idea of integrating sharding-based blockchain technology is proposed, along with its advantages and disadvantages, by conducting a systematic literature review of studies based on sharding-based blockchain technology in recent years. Based on the research findings, sharding-based technology is beneficial in securing IoT systems by improving security, access, and transaction rates. The findings also suggest several issues, such as cross-shard transactions, synchronization issues, and the concentration of stakes. With an increased focus on showcasing the important trade-offs, this paper also offers several recommendations for further research on the implementation of blockchain network technology for securing IoT sensors with applications in environment monitoring. These valuable insights are further effective in facilitating informed decisions while integrating sharding-based technology in developing more secure and efficient decentralized networks for internet data centers (IDCs), and monitoring the environment by picking out key points of the data.
Collapse
Affiliation(s)
- Ammad Aslam
- Department of Information Sciences and Technologies, University Institute of Lisbon, Av. das Forças Armadas, 1649-026 Lisbon, Portugal; (A.A.); (O.P.); (S.O.)
- Instituto de Telecomunicações, Av. Rovisco Pais, 1049-001 Lisbon, Portugal
| | - Octavian Postolache
- Department of Information Sciences and Technologies, University Institute of Lisbon, Av. das Forças Armadas, 1649-026 Lisbon, Portugal; (A.A.); (O.P.); (S.O.)
- Instituto de Telecomunicações, Av. Rovisco Pais, 1049-001 Lisbon, Portugal
| | - Sancho Oliveira
- Department of Information Sciences and Technologies, University Institute of Lisbon, Av. das Forças Armadas, 1649-026 Lisbon, Portugal; (A.A.); (O.P.); (S.O.)
- Instituto de Telecomunicações, Av. Rovisco Pais, 1049-001 Lisbon, Portugal
| | - José Dias Pereira
- Instituto de Telecomunicações, Av. Rovisco Pais, 1049-001 Lisbon, Portugal
- Instituto Politécnico de Setúbal, Escola Superior de Tecnologia de Setúbal, Campus do IPS—Estefanilha, 2910-761 Setúbal, Portugal
| |
Collapse
|
3
|
Li Y, Chen J, Zhou F, Ji D. EKV-VBQ: Ensuring Verifiable Boolean Queries in Encrypted Key-Value Stores. SENSORS (BASEL, SWITZERLAND) 2024; 24:6792. [PMID: 39517689 PMCID: PMC11548281 DOI: 10.3390/s24216792] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/13/2024] [Revised: 10/14/2024] [Accepted: 10/17/2024] [Indexed: 11/16/2024]
Abstract
To address the deficiencies in privacy-preserving expressive query and verification mechanisms in outsourced key-value stores, we propose EKV-VBQ, a scheme designed to ensure verifiable Boolean queries over encrypted key-value data. We have integrated blockchain and homomorphic Xor operations and pseudo-random functions to create a secure and verifiable datastore, while enabling efficient encrypted Boolean queries. Additionally, we have designed a lightweight verification protocol using bilinear map accumulators to guarantee the correctness of Boolean query results. Our security analysis demonstrates that EKV-VBQ is secure against adaptive chosen label attacks (IND-CLA) and guarantees Integrity and Unforgeability under the bilinear q-strong Diffie-Hellman assumption. Our performance evaluations showed reduced server-side storage overhead, efficient proof generation, and a significant reduction in user-side computational complexity by a factor of log n. Finally, GPU-accelerated optimizations significantly enhance EKV-VBQ's performance, reducing computational overhead by up to 50%, making EKV-VBQ highly efficient and suitable for deployment in environments with limited computational resources.
Collapse
Affiliation(s)
- Yuxi Li
- School of Computer Science and Engineering, Northeastern University, Shenyang 110819, China
| | - Jingjing Chen
- School of Computer Science and Engineering, Northeastern University, Shenyang 110819, China
| | - Fucai Zhou
- Software College, Northeastern University, Shenyang 110819, China
| | - Dong Ji
- National Frontiers Science Center for Industrial Intelligence and Systems Optimization, Northeastern University, Shenyang 110819, China
| |
Collapse
|
4
|
Nie Z. The suitability assessment for land territorial spatial planning based on ANN-CA model and the Internet of Things. Heliyon 2024; 10:e31237. [PMID: 38813234 PMCID: PMC11133803 DOI: 10.1016/j.heliyon.2024.e31237] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/08/2024] [Revised: 05/08/2024] [Accepted: 05/13/2024] [Indexed: 05/31/2024] Open
Abstract
This work aims to utilize Internet of Things (IoT) technology and the Artificial Neural Network - Cellular Automaton (ANN-CA) model to analyze the construction of indicators for territorial spatial planning and urban development suitability assessment. Firstly, the IoT technology is introduced, and its application potential in land planning is explored. Using the IoT technology, various data related to land use are collected, and these data are transmitted and summarized through IoT equipment to form a data base. Based on the collected data, the ANN-CA model and the "dual assessment" concept are employed to establish an indicator system for urban development suitability assessment, encompassing permanent basic farmland, ecological redlines, and current built-up areas. Through the combination of these two models, the future land use situation can be predicted more accurately. The trained model is evaluated, including simulation accuracy, error analysis, Kappa coefficient and other indicators. Compared with the actual data, the accuracy and credibility of the model are verified. Finally, according to the prediction results of the model, the land use situation is analyzed and interpreted to provide decision support for urban planning and development. The research results show that the combination of IoT technology and ANN-CA model can effectively analyze the evolution law of land use and the suitability of urban development. Through the reasonable setting and processing of model parameters and data, people can get high accuracy land use prediction results, which provides important reference and support for urban planning and sustainable development. The suitability for urban development within County M exhibits noticeable spatial disparities, with the central region being more suitable for development while the peripheral regions are relatively less favorable. This work provides valuable guidance for decision-makers and researchers in the field of territorial planning, and promotes orderly urban development and sustainable prosperity.
Collapse
Affiliation(s)
- Zhaoliang Nie
- School of Resources, Environment and Architectural Engineering, Chifeng University, Chifeng, 024000, China
- Key Laboratory of Land Space Planning and Disaster Risk Prevention and Control in Chifeng City, Chifeng 024000, China
| |
Collapse
|
5
|
Kuppusamy R, Murugesan A. IoT-based external attacks aware secure healthcare framework using blockchain and SB-RNN-NVS-FU techniques. Technol Health Care 2024; 32:2711-2731. [PMID: 38607777 DOI: 10.3233/thc-231895] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 04/14/2024]
Abstract
BACKGROUND In recent times, there has been widespread deployment of Internet of Things (IoT) applications, particularly in the healthcare sector, where computations involving user-specific data are carried out on cloud servers. However, the network nodes in IoT healthcare are vulnerable to an increased level of security threats. OBJECTIVE This paper introduces a secure Electronic Health Record (EHR) framework with a focus on IoT. METHODS Initially, the IoT sensor nodes are designated as registered patients and undergo initialization. Subsequently, a trust evaluation is conducted, and the clustering of trusted nodes is achieved through the application of Tasmanian Devil Optimization (STD-TDO) utilizing the Student's T-Distribution. Utilizing the Transposition Cipher-Squared random number generator-based-Elliptic Curve Cryptography (TCS-ECC), the clustered nodes encrypt four types of sensed patient data. The resulting encrypted data undergoes hashing and is subsequently added to the blockchain. This configuration functions as a network, actively monitored to detect any external attacks. To accomplish this, a feature reputation score is calculated for the network's features. This score is then input into the Swish Beta activated-Recurrent Neural Network (SB-RNN) model to classify potential attacks. The latest transactions on the blockchain are scrutinized using the Neutrosophic Vague Set Fuzzy (NVS-Fu) algorithm to identify any double-spending attacks on non-compromised nodes. Finally, genuine nodes are granted permission to decrypt medical records. RESULTS In the experimental analysis, the performance of the proposed methods was compared to existing models. The results demonstrated that the suggested approach significantly increased the security level to 98%, reduced attack detection time to 1300 ms, and maximized accuracy to 98%. Furthermore, a comprehensive comparative analysis affirmed the reliability of the proposed model across all metrics. CONCLUSION The proposed healthcare framework's efficiency is proved by the experimental evaluation.
Collapse
Affiliation(s)
- Ramesh Kuppusamy
- Department of Computer Science and Engineering, V.R.S. College of Engineering and Technology, Arasur, India
| | - Anbarasan Murugesan
- Department of Artificial Intelligence and Data Science, Panimalar Engineering College, Chennai, India
| |
Collapse
|
6
|
Anumala H. An Ensemble Model Health Care Monitoring System. Crit Rev Biomed Eng 2024; 52:33-54. [PMID: 39093446 DOI: 10.1615/critrevbiomedeng.2024049488] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 08/04/2024]
Abstract
Internet of things (IoT) is utilized to enhance conventional health care systems in several ways, including patient's disease monitoring. The data gathered by IoT devices is very beneficial to medical facilities and patients. The data needs to be secured against unauthorized modifications because of security and privacy concerns. Conversely, a variety of procedures are offered by block chain technology to safeguard data against modifications. Block chain-based IoT-based health care monitoring is thus a fascinating technical advancement that may aid in easing security and privacy problems associated withthe collection of data during patient monitoring. In this work, we present an ensemble classification-based monitoring system with a block-chain as the foundation for an IoT health care model. Initially, data generation is done by considering the diseases including chronic obstructive pulmonary disease (COPD), lung cancer, and heart disease. The IoT health care data is then preprocessed using enhanced scalar normalization. The preprocessed data was used to extract features such as mutual information (MI), statistical features, adjusted entropy, and raw features. The total classified result is obtained by averaging deep maxout, improved deep convolutional network (IDCNN), and deep belief network (DBN) ensemble classification. Finally, decision-making is done by doctors to suggest treatment based on the classified results from the ensemble classifier. The ensemble model scored the greatest accuracy (95.56%) with accurate disease classification at a learning percentage of 60% compared to traditional classifiers such as neural network (NN) (89.08%), long short term memory (LSTM) (80.63%), deep belief network (DBN) (79.78%) and GT based BSS algorithm (89.08%).
Collapse
|
7
|
Shin H, Ryu K, Kim JY, Lee S. Application of privacy protection technology to healthcare big data. Digit Health 2024; 10:20552076241282242. [PMID: 39502481 PMCID: PMC11536567 DOI: 10.1177/20552076241282242] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/26/2023] [Accepted: 08/23/2024] [Indexed: 11/08/2024] Open
Abstract
With the advent of the big data era, data security issues are becoming more common. Healthcare organizations have more data to use for analysis, but they lose money every year due to their inability to prevent data leakage. To overcome these challenges, research on the use of data protection technologies in healthcare is actively underway, particularly research on state-of-the-art technologies, such as federated learning announced by Google and blockchain technology, which has recently attracted attention. To learn about these research efforts, we explored the research, methods, and limitations of the most widely used privacy technologies. After investigating related papers published between 2017 and 2023 and identifying the latest technology trends, we selected related papers and reviewed related technologies. In the process, four technologies were the focus of this study: blockchain, federated learning, isomorphic encryption, and differential privacy. Overall, our analysis provides researchers with insight into privacy technology research by suggesting the limitations of current privacy technologies and suggesting future research directions.
Collapse
Affiliation(s)
- Hyunah Shin
- Department of Healthcare Data Science Center, Konyang University Hospital, Daejeon, Republic of Korea
| | - Kyeongmin Ryu
- Department of Healthcare Data Science Center, Konyang University Hospital, Daejeon, Republic of Korea
| | - Jong-Yeup Kim
- Department of Healthcare Data Science Center, Konyang University Hospital, Daejeon, Republic of Korea
- Department of Otorhinolaryngology—Head and Neck Surgery, Konyang University College of Medicine, Daejeon, Republic of Korea
- Department of Biomedical Informatics, Konyang University College of Medicine, Daejeon, Republic of Korea
| | - Suehyun Lee
- College of IT Convergence, Gachon University, Seongnam, Republic of Korea
| |
Collapse
|
8
|
Zhang C, Xu J, Tang R, Yang J, Wang W, Yu X, Shi S. Novel research and future prospects of artificial intelligence in cancer diagnosis and treatment. J Hematol Oncol 2023; 16:114. [PMID: 38012673 PMCID: PMC10680201 DOI: 10.1186/s13045-023-01514-5] [Citation(s) in RCA: 23] [Impact Index Per Article: 11.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/07/2023] [Accepted: 11/20/2023] [Indexed: 11/29/2023] Open
Abstract
Research into the potential benefits of artificial intelligence for comprehending the intricate biology of cancer has grown as a result of the widespread use of deep learning and machine learning in the healthcare sector and the availability of highly specialized cancer datasets. Here, we review new artificial intelligence approaches and how they are being used in oncology. We describe how artificial intelligence might be used in the detection, prognosis, and administration of cancer treatments and introduce the use of the latest large language models such as ChatGPT in oncology clinics. We highlight artificial intelligence applications for omics data types, and we offer perspectives on how the various data types might be combined to create decision-support tools. We also evaluate the present constraints and challenges to applying artificial intelligence in precision oncology. Finally, we discuss how current challenges may be surmounted to make artificial intelligence useful in clinical settings in the future.
Collapse
Affiliation(s)
- Chaoyi Zhang
- Department of Pancreatic Surgery, Fudan University Shanghai Cancer Center, No. 270 Dong'An Road, Shanghai, 200032, People's Republic of China
- Department of Oncology, Shanghai Medical College, Fudan University, Shanghai, 200032, People's Republic of China
- Shanghai Pancreatic Cancer Institute, No. 399 Lingling Road, Shanghai, 200032, People's Republic of China
- Pancreatic Cancer Institute, Fudan University, Shanghai, 200032, People's Republic of China
| | - Jin Xu
- Department of Pancreatic Surgery, Fudan University Shanghai Cancer Center, No. 270 Dong'An Road, Shanghai, 200032, People's Republic of China
- Department of Oncology, Shanghai Medical College, Fudan University, Shanghai, 200032, People's Republic of China
- Shanghai Pancreatic Cancer Institute, No. 399 Lingling Road, Shanghai, 200032, People's Republic of China
- Pancreatic Cancer Institute, Fudan University, Shanghai, 200032, People's Republic of China
| | - Rong Tang
- Department of Pancreatic Surgery, Fudan University Shanghai Cancer Center, No. 270 Dong'An Road, Shanghai, 200032, People's Republic of China
- Department of Oncology, Shanghai Medical College, Fudan University, Shanghai, 200032, People's Republic of China
- Shanghai Pancreatic Cancer Institute, No. 399 Lingling Road, Shanghai, 200032, People's Republic of China
- Pancreatic Cancer Institute, Fudan University, Shanghai, 200032, People's Republic of China
| | - Jianhui Yang
- Department of Pancreatic Surgery, Fudan University Shanghai Cancer Center, No. 270 Dong'An Road, Shanghai, 200032, People's Republic of China
- Department of Oncology, Shanghai Medical College, Fudan University, Shanghai, 200032, People's Republic of China
- Shanghai Pancreatic Cancer Institute, No. 399 Lingling Road, Shanghai, 200032, People's Republic of China
- Pancreatic Cancer Institute, Fudan University, Shanghai, 200032, People's Republic of China
| | - Wei Wang
- Department of Pancreatic Surgery, Fudan University Shanghai Cancer Center, No. 270 Dong'An Road, Shanghai, 200032, People's Republic of China
- Department of Oncology, Shanghai Medical College, Fudan University, Shanghai, 200032, People's Republic of China
- Shanghai Pancreatic Cancer Institute, No. 399 Lingling Road, Shanghai, 200032, People's Republic of China
- Pancreatic Cancer Institute, Fudan University, Shanghai, 200032, People's Republic of China
| | - Xianjun Yu
- Department of Pancreatic Surgery, Fudan University Shanghai Cancer Center, No. 270 Dong'An Road, Shanghai, 200032, People's Republic of China.
- Department of Oncology, Shanghai Medical College, Fudan University, Shanghai, 200032, People's Republic of China.
- Shanghai Pancreatic Cancer Institute, No. 399 Lingling Road, Shanghai, 200032, People's Republic of China.
- Pancreatic Cancer Institute, Fudan University, Shanghai, 200032, People's Republic of China.
| | - Si Shi
- Department of Pancreatic Surgery, Fudan University Shanghai Cancer Center, No. 270 Dong'An Road, Shanghai, 200032, People's Republic of China.
- Department of Oncology, Shanghai Medical College, Fudan University, Shanghai, 200032, People's Republic of China.
- Shanghai Pancreatic Cancer Institute, No. 399 Lingling Road, Shanghai, 200032, People's Republic of China.
- Pancreatic Cancer Institute, Fudan University, Shanghai, 200032, People's Republic of China.
| |
Collapse
|
9
|
Hiwale M, Walambe R, Potdar V, Kotecha K. A systematic review of privacy-preserving methods deployed with blockchain and federated learning for the telemedicine. HEALTHCARE ANALYTICS (NEW YORK, N.Y.) 2023; 3:100192. [PMID: 37223223 PMCID: PMC10160179 DOI: 10.1016/j.health.2023.100192] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/25/2023] [Revised: 04/18/2023] [Accepted: 04/30/2023] [Indexed: 05/25/2023]
Abstract
The unexpected and rapid spread of the COVID-19 pandemic has amplified the acceptance of remote healthcare systems such as telemedicine. Telemedicine effectively provides remote communication, better treatment recommendation, and personalized treatment on demand. It has emerged as the possible future of medicine. From a privacy perspective, secure storage, preservation, and controlled access to health data with consent are the main challenges to the effective deployment of telemedicine. It is paramount to fully overcome these challenges to integrate the telemedicine system into healthcare. In this regard, emerging technologies such as blockchain and federated learning have enormous potential to strengthen the telemedicine system. These technologies help enhance the overall healthcare standard when applied in an integrated way. The primary aim of this study is to perform a systematic literature review of previous research on privacy-preserving methods deployed with blockchain and federated learning for telemedicine. This study provides an in-depth qualitative analysis of relevant studies based on the architecture, privacy mechanisms, and machine learning methods used for data storage, access, and analytics. The survey allows the integration of blockchain and federated learning technologies with suitable privacy techniques to design a secure, trustworthy, and accurate telemedicine model with a privacy guarantee.
Collapse
Affiliation(s)
- Madhuri Hiwale
- Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune 412115, India
| | - Rahee Walambe
- Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune 412115, India
- Symbiosis Centre for Applied Artificial Intelligence (SCAAI), Symbiosis International (Deemed University), Pune 412115, India
| | - Vidyasagar Potdar
- Blockchain R&D Lab, School of Management and Marketing, Curtin University, Perth 6107, Australia
| | - Ketan Kotecha
- Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune 412115, India
- Symbiosis Centre for Applied Artificial Intelligence (SCAAI), Symbiosis International (Deemed University), Pune 412115, India
| |
Collapse
|
10
|
Irshad RR, Sohail SS, Hussain S, Madsen DØ, Zamani AS, Ahmed AAA, Alattab AA, Badr MM, Alwayle IM. Towards enhancing security of IoT-Enabled healthcare system. Heliyon 2023; 9:e22336. [PMID: 38034697 PMCID: PMC10687057 DOI: 10.1016/j.heliyon.2023.e22336] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/31/2023] [Revised: 10/29/2023] [Accepted: 11/09/2023] [Indexed: 12/02/2023] Open
Abstract
The Internet-of-Things (IoT)-based healthcare systems are comprised of a large number of networked medical devices, wearables, and sensors that collect and transmit data to improve patient care. However, the enormous number of networked devices renders these systems vulnerable to assaults. To address these challenges, researchers advocated reducing execution time, leveraging cryptographic protocols to improve security and avoid assaults, and utilizing energy-efficient algorithms to minimize energy consumption during computation. Nonetheless, these systems still struggle with long execution times, assaults, excessive energy usage, and inadequate security. We present a novel whale-based attribute encryption scheme (WbAES) that empowers the transmitter and receiver to encrypt and decrypt data using asymmetric master key encryption. The proposed WbAES employs attribute-based encryption (ABE) using whale optimization algorithm behaviour, which transforms plain data to ciphertexts and adjusts the whale fitness to generate a suitable master public and secret key, ensuring security against unauthorized access and manipulation. The proposed WbAES is evaluated using patient health record (PHR) datasets collected by IoT-based sensors, and various attack scenarios are established using Python libraries to validate the suggested framework. The simulation outcomes of the proposed system are compared to cutting-edge security algorithms and achieved finest performance in terms of reduced 11 s of execution time for 20 sensors, 0.121 mJ of energy consumption, 850 Kbps of throughput, 99.85 % of accuracy, and 0.19 ms of computational cost.
Collapse
Affiliation(s)
- Reyazur Rashid Irshad
- Department of Computer Science, College of Science and Arts, Sharurah-68341, Najran University, Kingdom of Saudi Arabia
| | - Shahab Saquib Sohail
- Department of Computer Science and Engineering, School of Engineering Sciences and Technology, Jamia Hamdard, New Delhi, India
| | - Shahid Hussain
- Innovation Value Institute (IVI), School of Business, National University of Ireland,Maynooth (NUIM), Maynooth, Co. kildare, W23, F2H6 Ireland
| | - Dag Øivind Madsen
- USN School of Business, University of South-Eastern Norway, 3511 Hønefoss, Norway
| | - Abu Sarwar Zamani
- Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia
| | - Abdallah Ahmed Alzupair Ahmed
- Department of Computer Science, College of Science and Arts, Sharurah-68341, Najran University, Kingdom of Saudi Arabia
| | - Ahmed Abdu Alattab
- Department of Computer Science, College of Science and Arts, Sharurah-68341, Najran University, Kingdom of Saudi Arabia
| | - Mohamed Mahdi Badr
- Department of Computer Science, College of Science and Arts, Sharurah-68341, Najran University, Kingdom of Saudi Arabia
| | - Ibrahim M. Alwayle
- Department of Computer Science, College of Science and Arts, Sharurah-68341, Najran University, Kingdom of Saudi Arabia
| |
Collapse
|
11
|
Yu X, Li W, Zhou X, Tang L, Sharma R. Deep learning personalized recommendation-based construction method of hybrid blockchain model. Sci Rep 2023; 13:17915. [PMID: 37863937 PMCID: PMC10589298 DOI: 10.1038/s41598-023-39564-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/10/2022] [Accepted: 07/27/2023] [Indexed: 10/22/2023] Open
Abstract
This study aims to explore the construction of a personalized recommendation system (PRS) based on deep learning under the hybrid blockchain model to further improve the performance of the PRS. Blockchain technology is introduced and further improved to address security problems such as information leakage in PRS. A Delegated Proof of Stake-Byzantine Algorand-Directed Acyclic Graph consensus algorithm, namely PBDAG consensus algorithm, is designed for public chains. Finally, a personalized recommendation model based on the hybrid blockchain PBDAG consensus algorithm combined with an optimized back propagation algorithm is constructed. Through simulation, the performance of this model is compared with practical Byzantine Fault Tolerance, Byzantine Fault Tolerance, Hybrid Parallel Byzantine Fault Tolerance, Redundant Byzantine Fault Tolerance, and Delegated Byzantine Fault Tolerance. The results show that the model algorithm adopted here has a lower average delay time, a data message delivery rate that is stable at 80%, a data message leakage rate that is stable at about 10%, and a system classification prediction error that does not exceed 10%. Therefore, the constructed model not only ensures low delay performance but also has high network security performance, enabling more efficient and accurate interaction of information. This solution provides an experimental basis for the information security and development trend of different types of data PRSs in various fields.
Collapse
Affiliation(s)
- Xiaomo Yu
- Guangxi Key Lab of Human-Machine Interaction and Intelligent Decision, Nanning Normal University, Nanning, 530001, Guangxi, China.
- Department of Logistics Management and Engineering, Nanning Normal University, Nanning, 530001, Guangxi, China.
| | - Wenjing Li
- Guangxi Key Lab of Human-Machine Interaction and Intelligent Decision, Nanning Normal University, Nanning, 530001, Guangxi, China
- Department of Logistics Management and Engineering, Nanning Normal University, Nanning, 530001, Guangxi, China
| | - Xiaomeng Zhou
- Guangxi Key Lab of Human-Machine Interaction and Intelligent Decision, Nanning Normal University, Nanning, 530001, Guangxi, China
| | - Ling Tang
- Arts Institute, Guangxi University for Nationalities, Nanning, 530001, Guangxi, China
| | - Rohit Sharma
- Department of Electronics and Communication Engineering, SRM Institute of Science and Technology, NCR Campus, Modinagar, Ghaziabad, UP, India
| |
Collapse
|
12
|
Ali A, Ali H, Saeed A, Ahmed Khan A, Tin TT, Assam M, Ghadi YY, Mohamed HG. Blockchain-Powered Healthcare Systems: Enhancing Scalability and Security with Hybrid Deep Learning. SENSORS (BASEL, SWITZERLAND) 2023; 23:7740. [PMID: 37765797 PMCID: PMC10537957 DOI: 10.3390/s23187740] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/12/2023] [Revised: 08/23/2023] [Accepted: 08/24/2023] [Indexed: 09/29/2023]
Abstract
The rapid advancements in technology have paved the way for innovative solutions in the healthcare domain, aiming to improve scalability and security while enhancing patient care. This abstract introduces a cutting-edge approach, leveraging blockchain technology and hybrid deep learning techniques to revolutionize healthcare systems. Blockchain technology provides a decentralized and transparent framework, enabling secure data storage, sharing, and access control. By integrating blockchain into healthcare systems, data integrity, privacy, and interoperability can be ensured while eliminating the reliance on centralized authorities. In conjunction with blockchain, hybrid deep learning techniques offer powerful capabilities for data analysis and decision making in healthcare. Combining the strengths of deep learning algorithms with traditional machine learning approaches, hybrid deep learning enables accurate and efficient processing of complex healthcare data, including medical records, images, and sensor data. This research proposes a permissions-based blockchain framework for scalable and secure healthcare systems, integrating hybrid deep learning models. The framework ensures that only authorized entities can access and modify sensitive health information, preserving patient privacy while facilitating seamless data sharing and collaboration among healthcare providers. Additionally, the hybrid deep learning models enable real-time analysis of large-scale healthcare data, facilitating timely diagnosis, treatment recommendations, and disease prediction. The integration of blockchain and hybrid deep learning presents numerous benefits, including enhanced scalability, improved security, interoperability, and informed decision making in healthcare systems. However, challenges such as computational complexity, regulatory compliance, and ethical considerations need to be addressed for successful implementation. By harnessing the potential of blockchain and hybrid deep learning, healthcare systems can overcome traditional limitations, promoting efficient and secure data management, personalized patient care, and advancements in medical research. The proposed framework lays the foundation for a future healthcare ecosystem that prioritizes scalability, security, and improved patient outcomes.
Collapse
Affiliation(s)
- Aitizaz Ali
- School of IT, UNITAR International University, Petaling Jaya 47301, Malaysia;
| | - Hashim Ali
- Department of Computer System, Abdul Wali Khan University Mardan (AWKUM), Mardan 23200, Pakistan;
| | - Aamir Saeed
- Department of Computer Science and IT, Jalozai Campus, UET Peshawar, Peshawar 25000, Pakistan;
| | - Aftab Ahmed Khan
- Department of Computer Science, Abdul Wali Khan University Mardan (AWKUM), Mardan 23200, Pakistan;
| | - Ting Tin Tin
- Faculty of Data Science and Information Technology, INTI International University, Nilai 71800, Malaysia;
| | - Muhammad Assam
- Department of Software Engineering, University of Science and Technology Bannu, Bannu 28100, Pakistan;
| | - Yazeed Yasin Ghadi
- Department of Computer Science and Software Engineering, Al Ain University, Abu Dhabi 122612, United Arab Emirates;
| | - Heba G. Mohamed
- Department of Electrical Engineering, College of Engineering, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
| |
Collapse
|
13
|
Ali A, Al-rimy BAS, Tin TT, Altamimi SN, Qasem SN, Saeed F. Empowering Precision Medicine: Unlocking Revolutionary Insights through Blockchain-Enabled Federated Learning and Electronic Medical Records. SENSORS (BASEL, SWITZERLAND) 2023; 23:7476. [PMID: 37687931 PMCID: PMC10490801 DOI: 10.3390/s23177476] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/29/2023] [Revised: 08/10/2023] [Accepted: 08/10/2023] [Indexed: 09/10/2023]
Abstract
Precision medicine has emerged as a transformative approach to healthcare, aiming to deliver personalized treatments and therapies tailored to individual patients. However, the realization of precision medicine relies heavily on the availability of comprehensive and diverse medical data. In this context, blockchain-enabled federated learning, coupled with electronic medical records (EMRs), presents a groundbreaking solution to unlock revolutionary insights in precision medicine. This abstract explores the potential of blockchain technology to empower precision medicine by enabling secure and decentralized data sharing and analysis. By leveraging blockchain's immutability, transparency, and cryptographic protocols, federated learning can be conducted on distributed EMR datasets without compromising patient privacy. The integration of blockchain technology ensures data integrity, traceability, and consent management, thereby addressing critical concerns associated with data privacy and security. Through the federated learning paradigm, healthcare institutions and research organizations can collaboratively train machine learning models on locally stored EMR data, without the need for data centralization. The blockchain acts as a decentralized ledger, securely recording the training process and aggregating model updates while preserving data privacy at its source. This approach allows the discovery of patterns, correlations, and novel insights across a wide range of medical conditions and patient populations. By unlocking revolutionary insights through blockchain-enabled federated learning and EMRs, precision medicine can revolutionize healthcare delivery. This paradigm shift has the potential to improve diagnosis accuracy, optimize treatment plans, identify subpopulations for clinical trials, and expedite the development of novel therapies. Furthermore, the transparent and auditable nature of blockchain technology enhances trust among stakeholders, enabling greater collaboration, data sharing, and collective intelligence in the pursuit of advancing precision medicine. In conclusion, this abstract highlights the transformative potential of blockchain-enabled federated learning in empowering precision medicine. By unlocking revolutionary insights from diverse and distributed EMR datasets, this approach paves the way for a future where healthcare is personalized, efficient, and tailored to the unique needs of each patient.
Collapse
Affiliation(s)
- Aitizaz Ali
- School of IT, UNITAR International University, Kelana Jaya, Petaling Jaya 47301, Malaysia;
- Faculty of Data Science and Information Technology, INTI International University, Nilai 71800, Malaysia;
| | - Bander Ali Saleh Al-rimy
- Department of Computer Science, Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia;
| | - Ting Tin Tin
- Faculty of Data Science and Information Technology, INTI International University, Nilai 71800, Malaysia;
| | - Saad Nasser Altamimi
- College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia;
| | - Sultan Noman Qasem
- College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia;
| | - Faisal Saeed
- DAAI Research Group, College of Computing and Digital Technology, Birmingham City University, Birmingham B4 7XG, UK;
| |
Collapse
|
14
|
Ali A, Al-rimy BAS, Almazroi AA, Alsubaei FS, Almazroi AA, Saeed F. Securing Secrets in Cyber-Physical Systems: A Cutting-Edge Privacy Approach with Consortium Blockchain. SENSORS (BASEL, SWITZERLAND) 2023; 23:7162. [PMID: 37631699 PMCID: PMC10458996 DOI: 10.3390/s23167162] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/17/2023] [Revised: 07/28/2023] [Accepted: 07/29/2023] [Indexed: 08/27/2023]
Abstract
In the era of interconnected and intelligent cyber-physical systems, preserving privacy has become a paramount concern. This paper aims a groundbreaking proof-of-concept (PoC) design that leverages consortium blockchain technology to address privacy challenges in cyber-physical systems (CPSs). The proposed design introduces a novel approach to safeguarding sensitive information and ensuring data integrity while maintaining a high level of trust among stakeholders. By harnessing the power of consortium blockchain, the design establishes a decentralized and tamper-resistant framework for privacy preservation. However, ensuring the security and privacy of sensitive information within CPSs poses significant challenges. This paper proposes a cutting-edge privacy approach that leverages consortium blockchain technology to secure secrets in CPSs. Consortium blockchain, with its permissioned nature, provides a trusted framework for governing the network and validating transactions. By employing consortium blockchain, secrets in CPSs can be securely stored, shared, and accessed by authorized entities only, mitigating the risks of unauthorized access and data breaches. The proposed approach offers enhanced security, privacy preservation, increased trust and accountability, as well as interoperability and scalability. This paper aims to address the limitations of traditional security mechanisms in CPSs and harness the potential of consortium blockchain to revolutionize the management of secrets, contributing to the advancement of CPS security and privacy. The effectiveness of the design is demonstrated through extensive simulations and performance evaluations. The results indicate that the proposed approach offers significant advancements in privacy protection, paving the way for secure and trustworthy cyber-physical systems in various domains.
Collapse
Affiliation(s)
- Aitizaz Ali
- School of IT, UNITAR International University, Petaling Jaya 47301, Malaysia;
| | - Bander Ali Saleh Al-rimy
- Department of Computer Science, Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia;
| | - Abdulwahab Ali Almazroi
- Department of Information Technology, College of Computing and Information Technology at Khulais, University of Jeddah, Jeddah 23218, Saudi Arabia;
| | - Faisal S. Alsubaei
- Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah 23218, Saudi Arabia
| | - Abdulaleem Ali Almazroi
- Department of Information Technology, Faculty of Computing and Information Technology in Rabigh, King Abdulaziz University, Rabigh 21911, Saudi Arabia;
| | - Faisal Saeed
- School of Computing and Digital Technology, Birmingham City University, Birmingham B4 7XG, UK;
| |
Collapse
|
15
|
Islam MR, Kabir MM, Mridha MF, Alfarhood S, Safran M, Che D. Deep Learning-Based IoT System for Remote Monitoring and Early Detection of Health Issues in Real-Time. SENSORS (BASEL, SWITZERLAND) 2023; 23:s23115204. [PMID: 37299933 DOI: 10.3390/s23115204] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/05/2023] [Revised: 05/23/2023] [Accepted: 05/26/2023] [Indexed: 06/12/2023]
Abstract
With an aging population and increased chronic diseases, remote health monitoring has become critical to improving patient care and reducing healthcare costs. The Internet of Things (IoT) has recently drawn much interest as a potential remote health monitoring remedy. IoT-based systems can gather and analyze a wide range of physiological data, including blood oxygen levels, heart rates, body temperatures, and ECG signals, and then provide real-time feedback to medical professionals so they may take appropriate action. This paper proposes an IoT-based system for remote monitoring and early detection of health problems in home clinical settings. The system comprises three sensor types: MAX30100 for measuring blood oxygen level and heart rate; AD8232 ECG sensor module for ECG signal data; and MLX90614 non-contact infrared sensor for body temperature. The collected data is transmitted to a server using the MQTT protocol. A pre-trained deep learning model based on a convolutional neural network with an attention layer is used on the server to classify potential diseases. The system can detect five different categories of heartbeats: Normal Beat, Supraventricular premature beat, Premature ventricular contraction, Fusion of ventricular, and Unclassifiable beat from ECG sensor data and fever or non-fever from body temperature. Furthermore, the system provides a report on the patient's heart rate and oxygen level, indicating whether they are within normal ranges or not. The system automatically connects the user to the nearest doctor for further diagnosis if any critical abnormalities are detected.
Collapse
Affiliation(s)
- Md Reazul Islam
- Department of Computer Science and Engineering, Bangladesh University of Business and Technology, Dhaka 1216, Bangladesh
| | - Md Mohsin Kabir
- Department of Computer Science and Engineering, Bangladesh University of Business and Technology, Dhaka 1216, Bangladesh
| | - Muhammad Firoz Mridha
- Department of Computer Science, American International University-Bangladesh, Dhaka 1229, Bangladesh
| | - Sultan Alfarhood
- Department of Computer Science, College of Computer and Information Sciences, King Saud University, P.O. Box 51178, Riyadh 11543, Saudi Arabia
| | - Mejdl Safran
- Department of Computer Science, College of Computer and Information Sciences, King Saud University, P.O. Box 51178, Riyadh 11543, Saudi Arabia
| | - Dunren Che
- School of Computing, Southern Illinois University, Carbondale, IL 62901, USA
| |
Collapse
|
16
|
Awad AI, Shokry M, Khalaf AA, Abd-Ellah MK. Assessment of potential security risks in advanced metering infrastructure using the OCTAVE Allegro approach. COMPUTERS AND ELECTRICAL ENGINEERING 2023; 108:108667. [DOI: 10.1016/j.compeleceng.2023.108667] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
|
17
|
Yang CH, Wu JP, Lee FY, Lin TY, Tsai MH. Detection and Mitigation of SYN Flooding Attacks through SYN/ACK Packets and Black/White Lists. SENSORS (BASEL, SWITZERLAND) 2023; 23:3817. [PMID: 37112158 PMCID: PMC10143797 DOI: 10.3390/s23083817] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/30/2023] [Revised: 03/18/2023] [Accepted: 04/05/2023] [Indexed: 06/19/2023]
Abstract
Software-defined networking (SDN) is a new network architecture that provides programmable networks, more efficient network management, and centralized control than traditional networks. The TCP SYN flooding attack is one of the most aggressive network attacks that can seriously degrade network performance. This paper proposes detection and mitigation modules against SYN flooding attacks in SDN. We combine those modules, which have evolved from the cuckoo hashing method and innovative whitelist, to get better performance compared to current methods Our approach reduces the traffic through the switch and improves detection accuracy, also the required register size is reduced by half for the same accuracy.
Collapse
Affiliation(s)
- Chun-Hao Yang
- Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan 701401, Taiwan
- Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu 300093, Taiwan
| | - Jhen-Ping Wu
- Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan 701401, Taiwan
| | - Fang-Yi Lee
- Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan 701401, Taiwan
- Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu 300093, Taiwan
| | - Ting-Yu Lin
- Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan 701401, Taiwan
| | - Meng-Hsun Tsai
- Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan 701401, Taiwan
- Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu 300093, Taiwan
| |
Collapse
|
18
|
Almalawi A, Khan AI, Alsolami F, Abushark YB, Alfakeeh AS. Managing Security of Healthcare Data for a Modern Healthcare System. SENSORS (BASEL, SWITZERLAND) 2023; 23:3612. [PMID: 37050672 PMCID: PMC10098823 DOI: 10.3390/s23073612] [Citation(s) in RCA: 13] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 03/06/2023] [Revised: 03/19/2023] [Accepted: 03/23/2023] [Indexed: 06/19/2023]
Abstract
The advent of Artificial Intelligence (AI) and the Internet of Things (IoT) have recently created previously unimaginable opportunities for boosting clinical and patient services, reducing costs and improving community health. Yet, a fundamental challenge that the modern healthcare management system faces is storing and securely transferring data. Therefore, this research proposes a novel Lionized remora optimization-based serpent (LRO-S) encryption method to encrypt sensitive data and reduce privacy breaches and cyber-attacks from unauthorized users and hackers. The LRO-S method is the combination of hybrid metaheuristic optimization and improved security algorithm. The fitness functions of lion and remora are combined to create a new algorithm for security key generation, which is provided to the serpent encryption algorithm. The LRO-S technique encrypts sensitive patient data before storing it in the cloud. The primary goal of this study is to improve the safety and adaptability of medical professionals' access to cloud-based patient-sensitive data more securely. The experiment's findings suggest that the secret keys generated are sufficiently random and one of a kind to provide adequate protection for the data stored in modern healthcare management systems. The proposed method minimizes the time needed to encrypt and decrypt data and improves privacy standards. This study found that the suggested technique outperformed previous techniques in terms of reducing execution time and is cost-effective.
Collapse
Affiliation(s)
- Abdulmohsen Almalawi
- Computer Science Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
| | - Asif Irshad Khan
- Computer Science Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
| | - Fawaz Alsolami
- Computer Science Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
| | - Yoosef B. Abushark
- Computer Science Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
| | - Ahmed S. Alfakeeh
- Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
| |
Collapse
|
19
|
López-Sorribes S, Rius-Torrentó J, Solsona-Tehàs F. A Bibliometric Review of the Evolution of Blockchain Technologies. SENSORS (BASEL, SWITZERLAND) 2023; 23:3167. [PMID: 36991877 PMCID: PMC10058821 DOI: 10.3390/s23063167] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/20/2023] [Revised: 03/09/2023] [Accepted: 03/14/2023] [Indexed: 06/19/2023]
Abstract
Bitcoin was created in 2008 as the first decentralized cryptocurrency, providing an innovative data management technology, which was later named blockchain. It ensured data validation without intervention from intermediaries. During its early stages, it was conceived as a financial technology by most researchers. It was not until 2015, when the Ethereum cryptocurrency was officially launched worldwide, along with its revolutionary technology called smart contracts, that researchers began to change their perception of the technology and look for uses outside the financial world. This paper analyzes the literature since 2016, one year after Ethereum, analyzing the evolution of interest in the technology to date. For this purpose, a total of 56,864 documents created between 2016 and 2022 from four major publishers were analyzed, providing answers to the following questions. Q1: How has interest in blockchain technology increased? Q2: What have been the major blockchain research interests? Q3: What have been the most outstanding works of the scientific community? The paper clearly exposes the evolution of blockchain technology, making it clear that, as the years go by, it is becoming a complementary technology instead of the main focus of studies. Finally, we highlight the most popular and recurrent topics discussed in the literature over the analyzed period of time.
Collapse
|
20
|
Lakhan A, Mohammed MA, Nedoma J, Martinek R, Tiwari P, Kumar N. DRLBTS: deep reinforcement learning-aware blockchain-based healthcare system. Sci Rep 2023; 13:4124. [PMID: 36914679 PMCID: PMC10009826 DOI: 10.1038/s41598-023-29170-2] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/25/2022] [Accepted: 01/31/2023] [Indexed: 03/16/2023] Open
Abstract
Industrial Internet of Things (IIoT) is the new paradigm to perform different healthcare applications with different services in daily life. Healthcare applications based on IIoT paradigm are widely used to track patients health status using remote healthcare technologies. Complex biomedical sensors exploit wireless technologies, and remote services in terms of industrial workflow applications to perform different healthcare tasks, such as like heartbeat, blood pressure and others. However, existing industrial healthcare technoloiges still has to deal with many problems, such as security, task scheduling, and the cost of processing tasks in IIoT based healthcare paradigms. This paper proposes a new solution to the above-mentioned issues and presents the deep reinforcement learning-aware blockchain-based task scheduling (DRLBTS) algorithm framework with different goals. DRLBTS provides security and makespan efficient scheduling for the healthcare applications. Then, it shares secure and valid data between connected network nodes after the initial assignment and data validation. Statistical results show that DRLBTS is adaptive and meets the security, privacy, and makespan requirements of healthcare applications in the distributed network.
Collapse
Affiliation(s)
- Abdullah Lakhan
- Department of Computer Science, Dawood University of Engineering and Technology, Sindh, Karachi, 74800, Pakistan.,Department of Telecommunications, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic.,Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic
| | - Mazin Abed Mohammed
- College of Computer Science and Information Technology, University of Anbar, Anbar, 31001, Iraq.,Department of Telecommunications, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic.,Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic
| | - Jan Nedoma
- Department of Telecommunications, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic
| | - Radek Martinek
- Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 70800, Ostrava, Czech Republic
| | - Prayag Tiwari
- School of Information Technology, Halmstad University, Halmstad, Sweden.
| | - Neeraj Kumar
- Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology (Deemed University), Patiala, Punjab, India.,School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India.,Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan
| |
Collapse
|
21
|
Kiania K, Jameii SM, Rahmani AM. Blockchain-based privacy and security preserving in electronic health: a systematic review. MULTIMEDIA TOOLS AND APPLICATIONS 2023; 82:1-27. [PMID: 36811000 PMCID: PMC9936121 DOI: 10.1007/s11042-023-14488-w] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/03/2022] [Revised: 01/09/2023] [Accepted: 01/31/2023] [Indexed: 05/31/2023]
Abstract
In today's world, health and medicine play an undeniable role in human life. Traditional and current Electronic Health Records (EHR) systems that are used to exchange information between medical stakeholders (patients, physicians, insurance companies, pharmaceuticals, medical researchers, etc.) suffer weaknesses in terms of security and privacy due to having centralized architecture. Blockchain technology ensures the privacy and security of EHR systems thanks to the use of encryption. Moreover, due to its decentralized nature, this technology prevents central failure and central attack points. In this paper, a systematic literature review (SLR) is proposed to analyze the existing Blockchain-based approaches for improving privacy and security in electronic health systems. The research methodology, paper selection process, and the search query are explained. 51 papers returned from our search criteria published between 2018 and Dec 2022 are reviewed. The main ideas, type of Blockchain, evaluation metrics, and used tools of each selected paper are discussed in detail. Finally, future research directions, open challenges, and some issues are discussed.
Collapse
Affiliation(s)
- Kianoush Kiania
- Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
| | - Seyed Mahdi Jameii
- Department of Computer Engineering, Shahr-e-Qods Branch, Islamic Azad University, Tehran, Iran
| | - Amir Masoud Rahmani
- Future Technology Research Center, National Yunlin University of Science and Technology, 123 University Road, Section 3, Douliou, Yunlin 64002 Taiwan
| |
Collapse
|
22
|
Sonia JJ, Jayachandran P, Md AQ, Mohan S, Sivaraman AK, Tee KF. Machine-Learning-Based Diabetes Mellitus Risk Prediction Using Multi-Layer Neural Network No-Prop Algorithm. Diagnostics (Basel) 2023; 13:723. [PMID: 36832207 PMCID: PMC9955149 DOI: 10.3390/diagnostics13040723] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/09/2023] [Revised: 01/28/2023] [Accepted: 01/29/2023] [Indexed: 02/17/2023] Open
Abstract
Over the past few decades, the prevalence of chronic illnesses in humans associated with high blood sugar has dramatically increased. Such a disease is referred to medically as diabetes mellitus. Diabetes mellitus can be categorized into three types, namely types 1, 2, and 3. When beta cells do not secrete enough insulin, type 1 diabetes develops. When beta cells create insulin, but the body is unable to use it, type 2 diabetes results. The last category is called gestational diabetes or type 3. This happens during the trimesters of pregnancy in women. Gestational diabetes, however, disappears automatically after childbirth or may continue to develop into type 2 diabetes. To improve their treatment strategies and facilitate healthcare, an automated information system to diagnose diabetes mellitus is required. In this context, this paper presents a novel system of classification of the three types of diabetes mellitus using a multi-layer neural network no-prop algorithm. The algorithm uses two major phases in the information system: the training phase and the testing phase. In each phase, the relevant attributes are identified using the attribute-selection process, and the neural network is trained individually in a multi-layer manner, starting with normal and type 1 diabetes, then normal and type 2 diabetes, and finally healthy and gestational diabetes. Classification is made more effective by the architecture of the multi-layer neural network. To provide experimental analysis and performances of diabetes diagnoses in terms of sensitivity, specificity, and accuracy, a confusion matrix is developed. The maximum specificity and sensitivity values of 0.95 and 0.97 are attained by this suggested multi-layer neural network. With an accuracy score of 97% for the categorization of diabetes mellitus, this proposed model outperforms other models, demonstrating that it is a workable and efficient approach.
Collapse
Affiliation(s)
- J. Jeba Sonia
- Department of Data Science and Business Systems, School of Computing, SRM Institute of Science and Technology, College of Engineering and Technology, Kattankulathur, Chennai 603203, India
| | - Prassanna Jayachandran
- School of Computer Science and Engineering, Vellore Institute of Technology, Chennai 600127, India
| | - Abdul Quadir Md
- School of Computer Science and Engineering, Vellore Institute of Technology, Chennai 600127, India
| | - Senthilkumar Mohan
- School of Information Technology and Engineering, Vellore Institute of Technology, Vellore 632014, India
| | | | - Kong Fah Tee
- Faculty of Engineering and Quantity Surveying, INTI International University, Nilai 71800, Malaysia
| |
Collapse
|
23
|
Suleski T, Ahmed M, Yang W, Wang E. A review of multi-factor authentication in the Internet of Healthcare Things. Digit Health 2023; 9:20552076231177144. [PMID: 37252257 PMCID: PMC10214092 DOI: 10.1177/20552076231177144] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/20/2022] [Accepted: 05/04/2023] [Indexed: 05/31/2023] Open
Abstract
Objective This review paper aims to evaluate existing solutions in healthcare authentication and provides an insight into the technologies incorporated in Internet of Healthcare Things (IoHT) and multi-factor authentication (MFA) applications for next-generation authentication practices. Our review has two objectives: (a) Review MFA based on the challenges, impact and solutions discussed in the literature; and (b) define the security requirements of the IoHT as an approach to adapting MFA solutions in a healthcare context. Methods To review the existing literature, we indexed articles from the IEEE Xplore, ACM Digital Library, ScienceDirect, and SpringerLink databases. The search was refined to combinations of 'authentication', 'multi-factor authentication', 'Internet of Things authentication', and 'medical authentication' to ensure that the retrieved journal articles and conference papers were relevant to healthcare and Internet of Things-oriented authentication research. Results The concepts of MFA can be applied to healthcare where security can often be overlooked. The security requirements identified result in stronger methodologies of authentication such as hardware solutions in combination with biometric data to enhance MFA approaches. We identify the key vulnerabilities of weaker approaches to security such as password use against various cyber threats. Cyber threats and MFA solutions are categorised in this paper to facilitate readers' understanding of them in healthcare domains. Conclusions We contribute to an understanding of up-to-date MFA approaches and how they can be improved for use in the IoHT. This is achieved by discussing the challenges, benefits, and limitations of current methodologies and recommendations to improve access to eHealth resources through additional layers of security.
Collapse
Affiliation(s)
- Tance Suleski
- School of Science, Cyber Security
Cooperative Research Centre, Edith Cowan University, Joondalup, WA, Australia
| | - Mohiuddin Ahmed
- School of Science, Edith Cowan University, Joondalup, Australia
| | - Wencheng Yang
- School of Mathematics, Physics and
Computing, University of Southern
Queensland, Toowoomba, Australia
| | - Eugene Wang
- Personalised Oncology Division, The Walter and Eliza Hall Institute of
Medical Research, Parkville, Australia
- Faculty of Medicine, Nursing and Health
Sciences, Monash University, Melbourne, Australia
| |
Collapse
|
24
|
Ahmad I, Abdullah S, Ahmed A. IoT-fog-based healthcare 4.0 system using blockchain technology. THE JOURNAL OF SUPERCOMPUTING 2022; 79:3999-4020. [PMID: 36157083 PMCID: PMC9483278 DOI: 10.1007/s11227-022-04788-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 08/24/2022] [Indexed: 06/16/2023]
Abstract
Real-time tracking and surveillance of patients' health has become ubiquitous in the healthcare sector as a result of the development of fog, cloud computing, and Internet of Things (IoT) technologies. Medical IoT (MIoT) equipment often transfers health data to a pharmaceutical data center, where it is saved, evaluated, and made available to relevant stakeholders or users. Fog layers have been utilized to increase the scalability and flexibility of IoT-based healthcare services, by providing quick response times and low latency. Our proposed solution focuses on an electronic healthcare system that manages both critical and non-critical patients simultaneously. Fog layer is distributed into two halves: critical fog cluster and non-critical fog cluster. Critical patients are handled at critical fog clusters for quick response, while non-critical patients are handled using blockchain technology at non-critical fog cluster, which protects the privacy of patient health records. The suggested solution requires little modification to the current IoT ecosystem while decrease the response time for critical messages and offloading the cloud infrastructure. Reduced storage requirements for cloud data centers benefit users in addition to saving money on construction and operating expenses. In addition, we examined the proposed work for recall, accuracy, precision, and F-score. The results show that the suggested approach is successful in protecting privacy while retaining standard network settings. Moreover, suggested system and benchmark are evaluated in terms of system response time, drop rate, throughput, fog, and cloud utilization. Evaluated results clearly indicate the performance of proposed system is better than benchmark.
Collapse
Affiliation(s)
- Israr Ahmad
- Department of Computer Science and IT, The Islamia University of Bahawalpur, Punjab, 63100 Pakistan
| | - Saima Abdullah
- Department of Computer Science and IT, The Islamia University of Bahawalpur, Punjab, 63100 Pakistan
| | - Adeel Ahmed
- Department of Computer Science and IT, The Islamia University of Bahawalpur, Punjab, 63100 Pakistan
| |
Collapse
|
25
|
Ghazal TM, Hasan MK, Abdullah SNHS, Bakar KAA, Al Hamadi H. Private blockchain-based encryption framework using computational intelligence approach. EGYPTIAN INFORMATICS JOURNAL 2022. [DOI: 10.1016/j.eij.2022.06.007] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
|
26
|
Mohanty MD, Das A, Mohanty MN, Altameem A, Nayak SR, Saudagar AKJ, Poonia RC. Design of Smart and Secured Healthcare Service Using Deep Learning with Modified SHA-256 Algorithm. Healthcare (Basel) 2022; 10:healthcare10071275. [PMID: 35885802 PMCID: PMC9317905 DOI: 10.3390/healthcare10071275] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/27/2022] [Revised: 06/25/2022] [Accepted: 06/29/2022] [Indexed: 11/16/2022] Open
Abstract
Background: The modern era of human society has seen the rise of a different variety of diseases. The mortality rate, therefore, increases without adequate care which consequently causes wealth loss. It has become a priority of humans to take care of health and wealth in a genuine way. Methods: In this article, the authors endeavored to design a hospital management system with secured data processing. The proposed approach consists of three different phases. In the first phase, a smart healthcare system is proposed for providing an effective health service, especially to patients with a brain tumor. An application is developed that is compatible with Android and Microsoft-based operating systems. Through this application, a patient can enter the system either in person or from a remote place. As a result, the patient data are secured with the hospital and the patient only. It consists of patient registration, diagnosis, pathology, admission, and an insurance service module. Secondly, deep-learning-based tumor detection from brain MRI and EEG signals is proposed. Lastly, a modified SHA-256 encryption algorithm is proposed for secured medical insurance data processing which will help detect the fraud happening in healthcare insurance services. Standard SHA-256 is an algorithm which is secured for short data. In this case, the security issue is enhanced with a long data encryption scheme. The algorithm is modified for the generation of a long key and its combination. This can be applicable for insurance data, and medical data for secured financial and disease-related data. Results: The deep-learning models provide highly accurate results that help in deciding whether the patient will be admitted or not. The details of the patient entered at the designed portal are encrypted in the form of a 256-bit hash value for secured data management.
Collapse
Affiliation(s)
- Mohan Debarchan Mohanty
- Department of Electrical Engineering, Campus 1, Technische Universität, 21073 Hamburg, Germany;
| | - Abhishek Das
- Department of Electronics and Communication Engineering, Institute of Technical Education and Research (ITER), Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar 701030, India;
| | - Mihir Narayan Mohanty
- Department of Electronics and Communication Engineering, Institute of Technical Education and Research (ITER), Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar 701030, India;
- Correspondence: (M.N.M.); (A.K.J.S.)
| | - Ayman Altameem
- Department of Computer Science and Engineering, College of Applied Studies and Community Services, King Saud University, Riyadh 11533, Saudi Arabia;
| | - Soumya Ranjan Nayak
- Amity School of Engineering and Technology, Amity University Uttar Pradesh, Noida 201303, India;
| | - Abdul Khader Jilani Saudagar
- Information Systems Department, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia
- Correspondence: (M.N.M.); (A.K.J.S.)
| | - Ramesh Chandra Poonia
- Department of Computer Science, CHRIST (Deemed to be University), Bangalore 560029, India;
| |
Collapse
|
27
|
Annane B, Alti A, Lakehal A. Blockchain based context-aware CP-ABE schema for Internet of Medical Things security. ARRAY 2022. [DOI: 10.1016/j.array.2022.100150] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022] Open
|
28
|
Qiu J. Ciphertext Database Audit Technology Under Searchable Encryption Algorithm and Blockchain Technology. JOURNAL OF GLOBAL INFORMATION MANAGEMENT 2022. [DOI: 10.4018/jgim.315014] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/05/2022]
Abstract
The study aims to solve the problems in auditing ciphertext data, improve audit efficiency, and increase the security of audit data in the audit server. First, the existing encryption algorithms are analyzed. Second, the searchable encryption algorithm is proposed to audit the ciphertext data, and an audit server scheme is made based on blockchain technology (BT). Finally, the two schemes are compared with the traditional audit technology. The results show that the server's inspection efficiency of the searchable encryption algorithm is higher.
Collapse
Affiliation(s)
- Jin Qiu
- Guangdong University of Science and Technology, China
| |
Collapse
|
29
|
A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things. SENSORS 2022; 22:s22062112. [PMID: 35336282 PMCID: PMC8953567 DOI: 10.3390/s22062112] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/13/2022] [Revised: 03/04/2022] [Accepted: 03/05/2022] [Indexed: 12/19/2022]
Abstract
The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applications are integrated with the IIoT. Moreover, it consists of several tiny sensors to sense the environment and gather the information. These devices continuously monitor, collect, exchange, analyze, and transfer the captured data to nearby devices or servers using an open channel, i.e., internet. However, such centralized system based on IIoT provides more vulnerabilities to security and privacy in IIoT networks. In order to resolve these issues, we present a blockchain-based deep-learning framework that provides two levels of security and privacy. First a blockchain scheme is designed where each participating entities are registered, verified, and thereafter validated using smart contract based enhanced Proof of Work, to achieve the target of security and privacy. Second, a deep-learning scheme with a Variational AutoEncoder (VAE) technique for privacy and Bidirectional Long Short-Term Memory (BiLSTM) for intrusion detection is designed. The experimental results are based on the IoT-Botnet and ToN-IoT datasets that are publicly available. The proposed simulations results are compared with the benchmark models and it is validated that the proposed framework outperforms the existing system.
Collapse
|
30
|
Reputation-Based Sharding Consensus Model in Information-Centric Networking. ELECTRONICS 2022. [DOI: 10.3390/electronics11050830] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/10/2022]
Abstract
The various integration systems of blockchain and information-centric network (ICN) have been applied to provide a trusted and neutral approach to cope with large-scale content distribution in IoT, AR/VR, or 5G/6G scenarios. As a result, the scalability problem of blockchain has been an increasing concern for researchers. The sharding mechanism is recognized as a promising approach to address this challenge. However, there are still many problems in the existing schemes. Firstly, real-time processing speed trades off security of validation. Secondly, simply randomly assigning nodes to the shards may make nodes located very far from each other, which increases the block propagation time and reduces the efficiency advantage brought by the sharding mechanism. Therefore, we optimize a reputation-based sharding consensus model by multi-dimension trust and leverage the affinity propagation (AP) algorithm for gathering consensus nodes into shards. Given the minimal possibility to be at fault in the security of validation, clients can achieve real-time processing speed with assurance. The evaluation results show that the normalized mean square error (NMSE) between the estimated reputation value and the real reputation value of our reputation scheme is less than 0.02. Meanwhile, compared with the classical sharding scheme Omniledger, TPS performance can achieve 1.4 times promotion in the case of a large-scale blockchain network of 1000 nodes.
Collapse
|
31
|
An AI-Enabled Hybrid Lightweight Authentication Model for Digital Healthcare Using Industrial Internet of Things Cyber-Physical Systems. SENSORS 2022; 22:s22041448. [PMID: 35214350 PMCID: PMC8875865 DOI: 10.3390/s22041448] [Citation(s) in RCA: 22] [Impact Index Per Article: 7.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/12/2022] [Revised: 02/08/2022] [Accepted: 02/09/2022] [Indexed: 02/04/2023]
Abstract
In the era of smart healthcare, Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS) play an important role, while accessing, monitoring, assessing, and prescribing patients ubiquitously. Efficient authentication and secure data transmission are the influential impediments of these networks that need to be addressed to maintain credence among clients, healthcare specialists, pharmacologists, and other associated entities. To address the authentication and data privacy issues in smart healthcare, in this paper we propose a lightweight hybrid deep learning protocol to achieve security and privacy. To achieve better results, we enabled the decentralized authentication of legitimate patient wearable devices to minimize computation cost, authentication time, and communication overheads with the help of an ML technique to predicate and forward the authentication attributes of patient wearable devices to the next concerned trusted authority, when it is shifted from region to another region. Simulation upshots of the ML scheme exhibited extraordinary security features with the cost-effective validation of legal patient wearable devices accompanied by worthwhile communication functionalities compared with previous work. However, the application of IoT-based medical devices and managing such a broad, sophisticated medical IoT system on standard Single Cloud platforms (CP) would be extremely tough. We propose a scalable FC with a blockchain-based architecture for a 5G-enabled IoMT platform. To work on an FC architecture with flowing effects, low overheads, and secure storage (SS), this research proposes a secured blockchain-based fogBMIoMT communication mechanism.
Collapse
|