banner

A Blockchain-based secure Internet of Medical Things framework for smart healthcare

Surjeet Dalal, Umesh Kumar Lilhore, Sarita Simaiya, Ashish Sharma, Vivek Jaglan, Manish Kumar, Monika Jangra, Nitin Goyal, Arun Kumar Rana

Abstract


The Internet of Medical Things (IoMT) industry has grown lightning during the estimated time frame. Privacy and security are essential concerns given the scale and widespread use of IoMT networks. Blending healthcare data in one place storage device to prepare an effective predictive model, on the other hand, increases more severe security and privacy issues, ownership, and regulation. An advanced system is required to enhance information utilization while restricting privacy issues. This research presents a new architecture to address security and privacy challenges in ehealthcare services in Healthcare 5.0. This paper integrates the distributed ledger technology (DLT) with IoMT. This integration has become necessary due to the growing demand for e-health-related technologies and services. The proposed solution in this research is based on a Blockchain framework to enhance medical data privacy and integrity. This research evidence found that Blockchain can overcome IoMT privacy and data protection. The proposed framework has farreaching consequences for the medical field. The proposed method has reduced Commit time by up to 10 seconds, and Commutative probability has been gained to 88%. It has advantages, including faster data exchange, less duplication of effort, and more secure patient information.


Keywords


Blockchain; Internet of Medical Things; security; privacy; Internet of Things; Health 5.0

Full Text:

PDF

References


1. Manzoor A, Braeken A, Kanhere SS, et al. Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on Blockchain. Journal of Network and Computer Applications 2021; 176: 102917. doi: 10.1016/j.jnca.2020.102917

2. Belhadi A, Djenouri Y, Srivastava G, et al. Privacy reinforcement learning for faults detection in the smart grid. Ad Hoc Networks 2021; 119: 102541. doi: 10.1016/j.adhoc.2021.102541

3. Li G, Dong M, Yang LT, et al. Preserving edge knowledge sharing among iot services: A Blockchain-based approach. IEEE Transactions on Emerging Topics in Computational Intelligence 2020; 4(5): 653–665. doi: 10.1109/TETCI.2019.2952587

4. Dalal S, Poongodi M, Lilhore UK, et al. Optimized LightGBM model for security and privacy issues in cyber‐physical systems. Transactions on Emerging Telecommunications Technologies 2023; 34(6): e4771. doi: 10.1002/ett.4771

5. Baniata H, Anaqreh A, Kertesz A. PF-BTS: A privacy-aware fog-enhanced Blockchain-assisted task scheduling. Information Processing and Management 2021; 58(1): 102393. doi: 10.1016/j.ipm.2020.102393

6. Meenakshi M, Rainu N, Surjeet D, et al. An efficient driver behavioral pattern analysis based on fuzzy logical feature selection and classification in big data analysis. Journal of Intelligent and Fuzzy Systems Preprint 2022; 43(3): 3283–3292. doi: 10.3233/JIFS-212007

7. Jindal U, Surjeet D, Rajesh G, et al. An integrated approach on verification of signatures using multiple classifiers (SVM and Decision Tree): A multi-classification approach. Institute of Advanced Science Extension 2023; 9(1): 99–109. doi: 10.21833/ijaas.2022.01.021

8. Reyna A, Martín C, Chen J, et al. On Blockchain and its integration with IoT. Challenges and opportunities. Future Generation Computer Systems 2018; 88: 173–190. doi: 10.1016/j.future.2018.05.046

9. Guo Z, Shi L, Xu M, Yin H. MRCC: A practical covert channel over monero with provable security. IEEE Access 2021; 9: 31816–31825. doi: 10.1109/ACCESS.2021.3060285

10. Dalal S, Bijeta S, Radulescu M, et al. Optimized deep learning with learning without forgetting (LwF) for weather classification for sustainable transportation and traffic safety. Sustainability 2023; 15(7): 6070. doi: 10.3390/su15076070

11. Islam AKMN, Mäntymäki M, Turunen M. Why do Blockchains split? An actor-network perspective on Bitcoin splits. Technological Forecasting and Social Change 2019; 148: 119743. doi: 10.1016/j.techfore.2019.119743

12. Bao Z, Wang Q, Shi W, et al. When Blockchain meets SGX: An overview, challenges, and open issues. IEEE Access 2020; 8: 170404–170420. doi: 10.1109/ACCESS.2020.3024254

13. Walsh C, O’Reilly P, Gleasure R, et al. Understanding manager resistance to Blockchain systems. European Management Journal 2021; 3(39): 353–365. doi: 10.1016/j.emj.2020.10.001

14. Fernández-Caramès TM, Fraga-Lamas P. Towards post-quantum Blockchain: A review on Blockchain cryptography resistant to quantum computing attacks. IEEE Access 2020; 8: 21091–21116. doi: 10.1109/ACCESS.2020.2968985

15. Li M, Weng J, Yang A, et al. Toward Blockchain-based fair and anonymous ad dissemination in vehicular networks. IEEE Transaction on Vehicular Technology 2019; 68(11): 11248–11259. doi: 10.1109/TVT.2019.2940148

16. Treiblmaier H, Sillaber C. The impact of Blockchain on e-commerce: A framework for salient research topics. Electronic Commerce Research and Applications 2021; 48: 101054. doi: 10.1016/j.elerap.2021.101054

17. Nalin M, Baroni I, Faiella G, et al. The European cross-border health data exchange roadmap: Caseresearch in the Italian setting. Journal of Biomedical Informatics 2019; 94: 103183. doi: 10.1016/j.jbi.2019.103183

18. Abu-elezz I, Hassan A, Nazeemudeen A, et al. The benefits and threats of Blockchain technology in healthcare: A scoping review. International Journal of Medical Informatics 2020; 142: 104246. doi: 10.1016/j.ijmedinf.2020.104246

19. Homoliak I, Venugopalan S, Reijsbergen D, et al. The security reference architecture for Blockchains: Toward a standardized model for studying vulnerabilities, threats, and defenses. IEEE Communications Surveys and Tutorials 2021; 23(1): 341–390. doi: 10.1109/COMST.2020.3033665

20. Inkinen T, Helminen R, Saarikoski J. Technological trajectories and scenarios in seaport digitalization. Research in Transportation Business and Management 2020; 41: 100633. doi: 10.1016/j.rtbm.2021.100633

21. Negro-Calduch E, Azzopardi-Muscat N, Krishnamurthy RS, Novillo-Ortiz D. Technological progress in electronic health record system optimization: Systematic review of systematic literature reviews. International Journal of Medical Informatics 2021; 152: 104507. doi: 10.1016/j.ijmedinf.2021.104507

22. Sai AR, Buckley J, Fitzgerald B, Gear AL. Taxonomy of centralization in public Blockchain systems: A systematic literature review. Information Processing Management 2021; 58: 102584. doi: 10.1016/j.ipm.2021.102584

23. Jaquet-Chiffelle DO, Casey E, Bourquenoud J. Tamperproof time-stamped provenance ledger using Blockchain technology. Forensic Science International: Digital Investigation 2020; 33: 300977. doi: 10.1016/j.fsidi.2020.300977

24. Schniederjans D, Curado C, Hedayati MK. Supply chain digitization trends: An integration of knowledge management. International Journal of Production Economics 2020; 220: 107439. doi: 10.1016/j.ijpe.2019.07.012

25. Radoglou-Grammatikis P, Sarigiannidis P, Iturbe E, et al. SPEAR SIEM: A security information and event management system for the smart grid. Computer Networks 2021; 193: 108008. doi: 10.1016/j.comnet.2021.108008

26. Leal F, Chis AE, Caton S, et al. Smart pharmaceutical manufacturing: Ensuring end-to-end traceability and data integrity in medicine production. Big Data Research 2021; 24: 100172. doi: 10.1016/j.bdr.2020.100172

27. Huang Y, Bian Y, Li R, et al. Smart contract security: A software lifecycle perspective. IEEE Access 2019; 7: 150184–150202. doi: 10.1109/ACCESS.2019.2946988

28. Koshy P, Babu S, Manoj BS. Sliding window Blockchain architecture for Internet of Things. IEEE Internet of Things Journal 2020; 7(4): 3338–3348. doi: 10.1109/JIOT.2020.2967119

29. Faust F, Thierry A, Müller T, Freiling F. Selective imaging of file system data on live systems. Forensic Science International: Digital Investigation 2021; 36: 301115. doi: 10.1016/j.fsidi.2021.301115

30. Xu Y, Huang Y. Segment Blockchain: A size reduced storage mechanism for Blockchain. IEEE Access 2020; 8: 17434–17441. doi: 10.1109/ACCESS.2020.2966464

31. Yousefnezhad N, Malhi A, Främling K. Security in product lifecycle of IoT devices: A survey. Journal of Network and Computer Applications 2020; 171: 102779–102779. doi: 10.1016/j.jnca.2020.102779

32. Paavolainen S, Carr C. Security properties of light clients on the ethereum Blockchain. IEEE Access 2020; 8: 124339–124358. doi: 10.1109/ACCESS.2020.3006113

33. Wang D, Zhu Y, Zhang Y, Liu G. Security assessment of Blockchain in Chinese classified protection of cybersecurity. IEEE Access 2020; 8: 203440–203456. doi: 10.1109/ACCESS.2020.3036004

34. Li G, Sheng X, Wu J, Yu H. Securing transmissions by friendly jamming scheme in wireless networks. Journal of Parallel and Distributed Computing 2020; 144(3): 260–267. doi: 10.1016/j.jpdc.2020.04.013

35. Chaturvedi K, Matheus A, Nguyen SH, Kolbe TH. Securing spatial data infrastructures for distributed smart city applications and services. Future Generation Computer Systems 2019; 101: 723–736. doi: 10.1016/j.future.2019.07.002

36. Dai W, Dai C, Choo KKR, et al. SDTE: A secure Blockchain-based data trading ecosystem. IEEE Transactions on Information Forensics and Security 2019; 15: 725–737. doi: 10.1109/TIFS.2019.2928256

37. Krzywiecki L, Bobowski A, Słowik M, et al. Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret. Compututer Networks 2020; 179: 107346. doi: 10.1016/j.comnet.2020.107346

38. Rožman N, Diaci J, Corn M. Scalable framework for Blockchain-based shared manufacturing. Robotics and Computer-Integrated Manufacturing 2021; 71: 102139. doi: 10.1016/j.rcim.2021.102139

39. Thakur S, Breslin JG. Scalable and secure product serialization for multi-party perishable good supply chains using Blockchain. Internet of Things 2020; 11: 100253. doi: 10.1016/j.iot.2020.100253

40. Fröwis M, Gottschalk T, Haslhofer B, et al. Safeguarding the evidential value of forensic cryptocurrency investigations. Forensic Science International: Digital Investigation 2020; 33: 200902. doi: 10.1016/j.fsidi.2019.200902

41. Akyildirim E, Corbet S, Cumming D, et al. Riding the wave of crypto-exuberance: The potential misusage of corporate Blockchain announcements. Technological Forecasting and Social Change 2020; 159: 120191. doi: 10.1016/j.techfore.2020.120191

42. Lisi A, Salve AD, Mori P, et al. Rewarding reviews with tokens: An Ethereum-based approach. Future Generation Computer Systems 2021; 120: 36–54. doi: 10.1016/j.future.2021.02.003

43. Benedetti H, Nikbakht E. Returns and network growth of digital tokens after cross-listings. Journal of Corporate Finance 2021; 66(2): 101853. doi: 10.1016/j.jcorpfin.2020.101853

44. Huang C, Wang Z, Chen H, et al. Repchain: A reputation-based secure, fast, and high incentive Blockchain system via sharding. IEEE Internet Things Journal 2020; 8(6): 4291–4304. doi: 10.1109/JIOT.2020.3028449

45. Shrestha R, Nam SY. Regional Blockchain for vehicular networks to prevent 51% attacks. IEEE Access 2019; 7: 95033–95045. doi: 10.1109/ACCESS.2019.2928753

46. Park SK, Kwon O, Kim Y, et al. Mind control attack: Undermining deep learning with GPU memory exploitation. Computer and Security 2021; 102: 102115. doi: 10.1016/j.cose.2020.102115

47. Onyema EM, Umesh KL, Praneet S, et al. Evaluation of IoT-Enabled hybrid model for genome sequence analysis of patients in healthcare 4.0. Measurement: Sensors 2023; 26: 100679. doi: 10.1016/j.measen.2023.100679

48. Arora S, Surjeet D. Trust evaluation factors in cloud computing with open stack. Journal of Computational and Theoretical Nanoscience 2019; 16(12): 5073–5077. doi: 10.1166/jctn.2019.8566

49. Le DN, Bijeta S, Surjeet D. A hybrid approach of secret sharing with fragmentation and encryption in cloud environment for securing outsourced medical database: A revolutionary approach. Journal of Cyber Security and Mobility 2018; 7(4): 379–408. doi: 10.13052/2245-1439.742

50. Jazaeri SS, Jabbehdari S, Asghari P, Javadi HHS. An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm. Cluster Computing 2023. doi: 10.1007/s10586-023-04023-9

51. Dalal S, Poongodi M, Umesh KL, et al. Extremely boosted neural network for more accurate multi-stage cyber attack prediction in cloud computing environment. Journal of Cloud Computing 2023; 12(1): 1–22. doi: 10.1186/s13677-022-00356-9

52. Wang Z, Hu J, Min G, et al. Spatial-temporal cellular traffic prediction for 5 G and beyond: A graph neural networks-based approach. IEEE Transactions on Industrial Informatics 2022; 19(4): 1–10. doi: 10.1109/tii.2022.3182768

53. Jazaeri SS, Parvaneh A, Sam J, Javadi HHS. Toward caching techniques in edge computing over SDN-IoT architecture: A review of challenges, solutions, and open issues. Multimedia Tools and Applications 2023. doi: 10.1007/s11042-023-15657-7

54. Sadhu PK, Yanambaka VP, Ahmed A. Internet of Things: Security and solutions survey. Sensors 2022; 22(19): 7433. doi: 10.3390/s22197433

55. Sadhu PK, Yanambaka VP, Ahmed A, Kumar Y. Prospect of Internet of Medical Things: A review on security requirements and solutions. Sensors 2022; 22(15): 5517. doi: 10.3390/s22155517

56. Sadhu PK, Jesse E, Yanambaka VP, Ahmed A. Supervised machine learning tools and PUF based internet of vehicles authentication framework. Electronics 2022; 11(23): 3845. doi: 10.3390/electronics11233845

57. Sadhu PK, Yanambaka VP, Ahmed A, Kumar Y. NAHAP: PUF-based three factor authentication system for Internet of Medical Things. IEEE Consumer Electronics Magazine 2022; 12(3): 107–115. doi: 10.1109/MCE.2022.3176420

58. Sadhu PK, Yanambaka VP, Ahmed A. Physical unclonable function and machine learning based group authentication and data masking for in-hospital segments. Electronics 2022; 11(24): 4155. doi: 10.3390/electronics11244155




DOI: https://doi.org/10.32629/jai.v6i3.592

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Surjeet Dalal, Umesh Kumar Lilhore, Sarita Simaiya, Ashish Sharma, Vivek Jaglan, Manish Kumar, Monika Jangra, Nitin Goyal, Arun Kumar Rana

License URL: https://creativecommons.org/licenses/by-nc/4.0