Maintaining Security of Patient Data by Employing Private Blockchain and Fog Computing Technologies based on Internet of Medical Things
DOI:
https://doi.org/10.31449/inf.v48i12.6047Abstract
The Internet of Medical Things (IoMT) is a vital component of the Internet of Things (IoT), and its importance lies in the urgent need for it and its provision of many medical services, such as examining and monitoring patients in hospitals and their homes. Given the presence of huge amounts of data based on the IoMT in the cloud system, data storage methods should witness a major revolution, and given the exposure of IoMT systems to electronic attacks, as recent studies have indicated, which makes them unsafe, data must be protected with security systems. In our work, we propose a Cryptography Health Security System (CryptoHSS) to support medical IoT security. Our proposed CryptoHSS relies on Decision Tree (DT), Naive Bayes (NB), Two-Fish, and Jellyfish algorithms within Private Blockchain (PBC) and Fog Computing to build robust security measures. The Two-Fish encryption algorithm is used to provide anonymity of medical information. In our proposed system, NB is used to quickly classify patient data, while DT is used to make accurate medical decisions based on the collected data. The Jellyfish algorithm was used to detect similarities between data and increase the security of data transmission within CryptoHSS. Two-Fish, NB, DT, and Jellyfish algorithms are designed to work in harmony with PBC. CryptoHSS distributes and manages peer-to-peer data in IoMT. The benefit of Fog Computing (FC) is that it speeds up the decision-making process without moving to distant clouds. We analyzed our system in terms of performance and security. Our results indicate that CryptoHSS provides lightweight operations to support complex security measures that qualify it to support health organizations. In terms of security, our system provides reliable security against attacks by keeping medical data encrypted and confidential, with the encryption and decryption rate with the Two-Fish algorithm reaching more than 98%, in addition to providing diagnosis of medical conditions and making appropriate medical decisions.References
M. Al-Zubaidie, Z. Zhang, and J. Zhang, "PAX: Using pseudonymization and anonymization to protect patients' identities
and data in the healthcare system," International Journal of Environmental Research and Public Health, vol. 16, no. 9,
p. 1490, 2019. [Online]. Available: https: //doi.org/10.3390/ijerph16091490.
S. A. Yousiff, R. A. Muhajjar, and M. H. Al-Zubaidie, "Designing a Blockchain approach to secure firefighting stations based Internet
of Things," Informatica, vol. 47, no. 10, pp. 09-26, 2023. [Online]. Available: https://doi.org/10.31449/inf.v47i10.5395.
M. A. Rahman, M. S. Hossain, M. S. Islam, N. A. Alrajeh, and G. Muhammad, "Secure and provenance enhanced Internet of health
Things framework: A Blockchain managed federated learning approach," IEEE Access, vol. 8, pp. 205 071-205 087, 2020. [Online]. Available: https://doi.org/10.1109/ACCESS.2020.3037474.
M. Al-Hawawreh and M. S. Hossain, "A privacy-aware framework for detecting cyber attacks on Internet of medical Things systems
using data fusion and quantum deep learning," Information Fusion, vol. 99, p. 101889, 2023. [Online]. Available: https://doi.org/10.1016/j.inffus.2023.101889.
M. Al-Zubaidie, Z. Zhang, and J. Zhang, "REISCH: Incorporating lightweight and reliable algorithms into healthcare applications of WSNs," Applied Sciences, vol. 10, no. 6, p. 2007, 2020. [Online]. Available: https://doi.org/10.3390/app10062007.
M. Al-Zubaidie, "Implication of lightweight and robust hash function to support key exchange in health sensor networks," Symmetry, vol. 15, no. 1, p. 152, 2023. [Online]. Available: https://doi.org/10.3390/sym15010152.
M. Al-Zubaidie, Z. Zhang, and J. Zhang, "Efficient and secure ECDSA algorithm and its applications: A survey," International Journal of Communication Networks and Information Security (IJCNIS), vol. 11, pp. 7-35, 2019. [Online]. Available: https://doi.org/10.17762/ijcnis.v11i1.3827.
M. Al-Zubaidie, Z. Zhang, and J. Zhang,"RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare
applications," Security and Communication Networks, vol. 2019, 2019. [Online]. Available: https://doi.org/10.1155/2019/3263902.
F. A. Alzahrani, M. Ahmad, and M. T. J. Ansari, "Towards design and development of security assessment framework for Internet of medical Things," Applied Sciences, vol. 12, no. 16, p. 8148, 2022. [Online]. Available: https://doi.org/10.3390/app12168148.
M. S. A. Muthanna, R. Alkanhel, A. Muthanna, A. Raq, and W. A. M. Abdullah, "Towards SDN-enabled, intelligent intrusion detection system for Internet of Things (IoT)," IEEE Access, vol. 10,
pp. 22 756-22 768, 2022. [Online]. Available: https://doi.org/10.1109/ACCESS.2022.3153716.
B. Dammak, M. Turki, S. Cheikhrouhou, M. Baklouti, R. Mars, and A. Dhahbi, "LoRaChainCare: An IoT architecture integrating
Blockchain and LORA network for personal health care data monitoring," Sensors, vol. 22, no. 4, p. 1497, 2022. [Online]. Available: https://doi.org/10.3390/s22041497.
P. Bagga, A. K. Das, V. Chamola, and M. Guizani, "Blockchain-envisioned access control for Internet of Things applications: A comprehensive survey and future directions," Telecommunication Sys-
tems, vol. 81, no. 1, pp. 125-173, 2022. [Online]. Available: https://doi.org/10.1007/s11235-022-00938-7.
S. U. A. Laghari, S. Manickam, A. K. Al-Ani, M. A. Al-Shareeda, and S. Karuppayah, "ES-SECS/GEM: An efficient security
mechanism for SECS/GEM communications," IEEE Access, vol. 11, pp. 31 813-31 828, 2023. [Online]. Available: https://doi.org/10.1109/ACCESS.2023.3262310.
T. M. Ghazal, M. K. Hasan, S. N. H. Abdallah, and K. A. Abubakkar, "Secure IoMT pattern recognition and exploitation for multimedia information processing using private blockchain and fuzzy logic," Transactions on Asian and Low-Resource Language Information Processing, 2022. [Online]. Available: http://dx.doi.org/10.1145/3523283.
A. Lakhan, M. A. Mohammed, K. H. Abdulkareem, M. khanapi Abd Ghani, H. A. Marhoon, J. Nedoma, R. Martinek, and B. Garcia-Zapirain, "Secure blockchain assisted Internet of medical Things architecture for data fusion enabled cancer workflow," Internet of Things, vol. 24, p. 100928, 2023. [Online]. Available: https://doi.org/10.1016/j.iot.2023.100928.
A. Ali, B. A. S. Al-Rimy, F. S. Alsubaei, A. A. Almazroi, and A. A. Almazroi, "Healthlock: Blockchain-based privacy preservation using homomorphic encryption in Internet of Things healthcare applications," Sensors, vol. 23, no. 15, p. 6762, 2023. [Online]. Available: https://doi.org/10.3390/s23156762.
A. Raj and S. Prakash, "Privacy preservation of the Internet of medical Things using Blockchain," Health Services and Outcomes Research Methodology, pp. 1-28, 2023. [Online]. Available: https://doi.org/10.1007/s10742-023-00306-1.
A. Djeddai and R. Khemaissia, "Privykg: Security and privacy preservation of knowledge graphs using blockchain technology,"
Informatica, vol. 47, no. 5, 2023. [Online]. Available: https://doi.org/10.31449/inf.v47i5.4698.
S. Ahamad, P. Gupta, P. B. Acharjee, K. P. Kiran, Z. Khan, and M. F. Hasan, "The role of block chain technology and Internet of Things (IoT) to protect financial transactions in crypto currency market," Materials Today: Proceedings, vol. 56, pp. 2070-2074, 2022. [Online]. Available: https://doi.org/10.1016/j.matpr.2021.11.405.
B. Gbadamosi, R. O. Ogundokun, E. A. Adeniyi, S. Misra, and N. F. Stephens, Medical data analysis for IoT-based datasets in the cloud using Naïve Bayes classifier for prediction of heart disease," in New frontiers in cloud computing and Internet of Things. Springer, 2022, pp. 365-386, ISBN: 978-3-031-05527-0.
G. S. Shyaa and M. Al-Zubaidie, "Utilizing trusted lightweight ciphers to support electronic-commerce transaction cryptography," Applied Sciences, vol. 13, no. 12, p. 7085, 2023. [Online]. Available: https://doi.org/10.3390/app13127085.
W. Haryono, "Comparison encryption of how to work caesar cipher, hill cipher, Blowfish and Twofish," Data Science: Journal of Computing and Applied Informatics, vol. 4, no. 2, pp. 100-110, 2020. [Online]. Available: https://doi.org/10.32734/jocai.v4.i2-4004.
A. Khare, G. M. Kakandikar, and O. K. Kulkarni, "An insight review on Jellyfish optimization algorithm and its application in engineering," Journal homepage: http://iieta. org/journals/rces, vol. 9, no. 1, pp. 31-40, 2022. [Online]. Available: https://doi.org/10.18280/rces.090103.
F. E. Botchey, Z. Qin, and K. Hughes-Lartey, "Mobile money fraud prediction--a cross-case analysis on the efficiency of support
vector machines, gradient boosted decision trees, and Naïve Bayes algorithms," Information, vol. 11, no. 8, p. 383, 2020. [Online]. Available: https://doi.org/10. 3390/info11080383.
M. Al-Zubaidie and G. S. Shyaa, "Applying detection leakage on hybrid cryptography to secure transaction information in e-commerce apps," Future Internet, vol. 15, no. 8, p. 262, 2023. [Online]. Available: https://doi.org/10.3390/fi15080262.
R. Matzutt, B. Kalde, J. Pennekamp, A. Drichel, M. Henze, and K. Wehrle, "Coinprune: Shrinking bitcoin's Blockchain retrospectively," IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3064-3078, 2021. [Online]. Available: https://doi.org/10.1109/TNSM.2021.3073270.
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika