banner

Revolutionizing healthcare with fog computing, IoT, and machine learning: An innovative framework for enhanced data security and QoS optimization

Mohit Lalit, Gaurav Bathla, Surender Singh

Abstract


Real-time health monitoring technologies, such as fog computing (FC) and Internet of Things (IoT) sensors, have brought in a new era of healthcare. Healthcare services have accepted IoT with great ease, in accordance with Industry 4.0 goals which helped by strong fundamental components such as FC. This research uses cutting-edge technologies like fog computing and IoT to present a novel framework for meeting the changing demands of the healthcare monitoring system. With the use of machine learning, this work seeks to improve crucial communication characteristics and further the research by identifying the best security method based on the occupations of the patients. For optimisation, the framework makes use of the Firefly (FFLY) and Grey Wolf Optimisation (GWO) algorithms. Furthermore, Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) encryption techniques are taken into consideration to improve data security in healthcare simulations. This security selection is powered by machine learning-based classification algorithms, where the primary goal is to maintain security while preserving energy resources. In summary, the amalgamation of the RSA security algorithm with the Firefly (FFLY) and Grey Wolf Optimization (GWO) algorithms yielded substantial enhancements in several critical Quality of Service (QoS) attributes. The proposed improved healthcare system obtains significant results in terms of QoS parameters and security selection using machine learning classification methods, surpassing the basic findings. Significantly, reliability experienced notable improvements of 17.32% and 22.69%, convergence achieved optimizations of 9.64% and 16.02%, and interoperability demonstrated improvements of 6.61% and 8.71%. Notably, when it comes to energy consumption, a vital consideration for resource-limited sensor configurations, FFLY and GWO with RSA showcased optimizations of 11.03% and 13.16%. The choice of a security algorithm is determined through machine learning techniques, where the Support Vector Machine (SVM) algorithm outperformed alternative methods. In the evaluation of classification techniques, SVM and Random Forest (RF) exhibited accuracy and F-Measure values of 0.999 and 0.993, respectively. These results underscore SVM’s effectiveness in managing medical data.


Keywords


optimization; interoperability; reliability; energy consumption; machine learning

Full Text:

PDF

References


1. Al-Atawi AA, Khan F, Kim CG. Application and Challenges of IoT Healthcare System in COVID-19. Sensors. 2022; 22(19): 7304. doi: 10.3390/s22197304

2. Sajedi SN, Maadani M, Nesari Moghadam M. F-LEACH: a fuzzy-based data aggregation scheme for healthcare IoT systems. The Journal of Supercomputing. 2021; 78(1): 1030-1047. doi: 10.1007/s11227-021-03890-6

3. Deepak BBVL, Bahubalendruni MVAR, Parhi DRK, et al. Intelligent Manufacturing Systems in Industry 4.0. Springer Nature Singapore; 2023. doi: 10.1007/978-981-99-1665-8

4. Bedi P, Das S, Goyal SB, et al. A novel routing protocol based on grey wolf optimization and Q learning for wireless body area network. Expert Systems with Applications. 2022; 210: 118477. doi: 10.1016/j.eswa.2022.118477

5. Manshahia MS. Grey Wolf Algorithm based Energy-Efficient Data Transmission in Internet of Things. Procedia Computer Science. 2019; 160: 604-609. doi: 10.1016/j.procs.2019.11.040

6. Savanović N, Toskovic A, Petrovic A, et al. Intrusion Detection in Healthcare 4.0 Internet of Things Systems via Metaheuristics Optimized Machine Learning. Sustainability. 2023; 15(16): 12563. doi: 10.3390/su151612563

7. Ramaiah NS, Ahmed ST. An IoT-Based Treatment Optimization and Priority Assignment Using Machine Learning. ECS Trans, 107(1), 1487–1495. doi: 10.1149/10701.1487ECST/META

8. Jacob TP, Pravin A, Kumar RR. A secure IoT based healthcare framework using modified RSA algorithm using an artificial hummingbird-based CNN. Transactions on Emerging Telecommunications Technologies. 2022; 33(12). doi: 10.1002/ett.4622

9. Alnaim AK, Alwakeel AM. Machine-Learning-Based IoT–Edge Computing Healthcare Solutions. Electronics. 2023; 12(4): 1027. doi: 10.3390/electronics12041027

10. Khadidos AO, Shitharth S, Khadidos AO, et al. Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism. Papageorgas P, ed. Journal of Sensors. 2022; 2022: 1-17. doi: 10.1155/2022/8457116

11. Yamashita T, Wakata Y, Nakaguma H, et al. Machine learning for classification of postoperative patient status using standardized medical data. Computer Methods and Programs in Biomedicine. 2022; 214: 106583. doi: 10.1016/j.cmpb.2021.106583

12. Khwailleh D, Al-balas F. A dynamic data encryption method based on addressing the data importance on the internet of things. International Journal of Electrical and Computer Engineering (IJECE). 2022; 12(2): 2139. doi: 10.11591/ijece.v12i2.pp2139-2146

13. Kishor A, Chakraborty C. Artificial Intelligence and Internet of Things Based Healthcare 4.0 Monitoring System. Wireless Personal Communications. 2021; 127(2): 1615-1631. doi: 10.1007/s11277-021-08708-5

14. Irshad RR, Hussain S, Sohail SS, et al. A Novel IoT-Enabled Healthcare Monitoring Framework and Improved Grey Wolf Optimization Algorithm-Based Deep Convolution Neural Network Model for Early Diagnosis of Lung Cancer. Sensors. 2023; 23(6): 2932. doi: 10.3390/s23062932

15. Taddeo AV, Ferrante A. Run-time selection of security algorithms for networked devices. Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks. Published online October 28, 2009. doi: 10.1145/1641944.1641963

16. Sodhro AH, Zahid N. AI-Enabled Framework for Fog Computing Driven E-Healthcare Applications. Sensors. 2021; 21(23): 8039. doi: 10.3390/s21238039

17. Alazzam MB, Alassery F, Almulihi A. A Novel Smart Healthcare Monitoring System Using Machine Learning and the Internet of Things. Rani S, ed. Wireless Communications and Mobile Computing. 2021; 2021: 1-7. doi: 10.1155/2021/5078799

18. Kishor A, Chakraborty C, Jeberson W. Intelligent healthcare data segregation using fog computing with internet of things and machine learning. International Journal of Engineering Systems Modelling and Simulation. 2021; 12(2/3): 188. doi: 10.1504/ijesms.2021.115533

19. Khadse V. An empirical comparison of supervised machine learning algorithms for internet of things data. Fourth International Conference on Computing Communication. Available online: https://ieeexplore.ieee.org/abstract/document/8697476/?casa_token=SqliZQlQhG4AAAAA:i21wkyY8TH0p9aUxNO_sCY6gxuJdCeon9dD7IWcJyWXfty_J8zp-qhV84PoSkjh1lQikILg (accessed on 29 June 2023).

20. Watanabe O, Zeugmann T, eds. Stochastic Algorithms: Foundations and Applications. Springer Berlin Heidelberg; 2009. doi: 10.1007/978-3-642-04944-6

21. Mirjalili S, Song Dong J, Lewis A, et al. Nature-Inspired Optimizers. Springer International Publishing; 2020. doi: 10.1007/978-3-030-12127-3

22. Vanstone SA. Elliptic curve cryptosystem—The answer to strong, fast public-key cryptography for securing constrained environments. Information Security Technical Report, 2(2), 78–87. doi: 10.1016/S1363-4127(97)81331-3

23. Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 1978; 21(2): 120-126. doi: 10.1145/359340.359342

24. Suárez-Albela M, Fraga-Lamas P, Fernández-Caramés T. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices. Sensors. 2018; 18(11): 3868. doi: 10.3390/s18113868

25. Mahto D, Khan D. Security analysis of elliptic curve cryptography and RSA. Available online: http://www.iaeng.org/publication/WCE2016/WCE2016_pp419-422.pdf (accessed on 6 October 2023).

26. Perez GM, Tiwari S, Trivedi MC, et al. Ambient Communications and Computer Systems. Springer Singapore; 2018. doi: 10.1007/978-981-10-7386-1

27. Mousavi SK, Ghaffari A, Besharat S, et al. Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks. 2021; 27(2): 1515-1555. doi: 10.1007/s11276-020-02535-5

28. Vahdati Z, Ghasempour A, Salehi M, et al. Comparison of ECC and RSA algorithms in IoT devices. Article in Journal of Theoretical and Applied Information Technology. 2019; 31: 16.

29. Boneh D, Shacham H. Fast variants of RSA. CryptoBytes. 2002; 5(1): 1-9.

30. U.S. Department of Health & Human Services. Centers for Disease Control and Prevention. 2021.

31. Kishor A, Chakraborty C, Jeberson W. Reinforcement learning for medical information processing over heterogeneous networks. Multimedia Tools and Applications. Published online March 29, 2021. doi: 10.1007/s11042-021-10840-0

32. Singh PK, Wierzchoń ST, Tanwar S, et al. Proceedings of Second International Conference on Computing, Communications, and Cyber-Security. Springer Singapore; 2021. doi: 10.1007/978-981-16-0733-2

33. Weka 3: Data Mining Software in Java. Available online: https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Weka+3%3A+Data+Mining+Software+in+Java.+http%3A%2F%2Fwww.cs.waikato.ac.nz%2Fml%2Fweka%2F%2C+Accessed+13+July+2017&btnG= (accessed on 10 August 2023).




DOI: https://doi.org/10.32629/jai.v7i5.1506

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Mohit Lalit, Gaurav Bathla1, Surender Singh

License URL: https://creativecommons.org/licenses/by-nc/4.0/