Skip to main content
Log in

Fusion of machine learning and blockchain-based privacy-preserving approach for healthcare data in the Internet of Things

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In recent years, the rapid integration of Internet of Things (IoT) devices into the healthcare sector has brought about revolutionary advancements in patient care and data management. While these technological innovations hold immense promise, they concurrently raise critical security concerns, particularly in safeguarding medical data against potential cyber threats. The sensitive nature of health-related information requires robust measures to ensure patient data's confidentiality, integrity, and availability within IoT-enabled medical environments. Addressing the imperative need for enhanced security in IoT-based healthcare systems, we propose a comprehensive method encompassing three distinct phases. In the first phase, we implement blockchain-enabled request and transaction encryption to fortify the security of data transactions, providing an immutable and transparent framework. Subsequently, in the second phase, we introduce request pattern recognition check, leveraging diverse data sources to identify and thwart potential unauthorized access attempts. Finally, the third phase incorporates feature selection and the BiLSTM network to enhance the accuracy and efficiency of intrusion detection through advanced machine-learning techniques. We compared the simulation results of the proposed method with three recent related methods, namely AIBPSF-IoMT, OMLIDS-PBIoT, and AIMMFIDS. The evaluation criteria encompass detection rates, false alarm rates, precision, recall, and accuracy, crucial benchmarks in assessing the overall performance of intrusion detection systems. Notably, our findings reveal that the proposed method outperforms these existing methods across all evaluated criteria, underscoring its superiority in enhancing the security posture of IoT-based healthcare systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Fig. 5
Algorithm 2
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

No datasets were generated or analyzed during the current study.

References

  1. Cai J, Liang W, Li X, Li K, Gui Z, Khan MK (2023) GTxChain: a secure IoT smart blockchain architecture based on graph neural network. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3296469

    Article  Google Scholar 

  2. Saheed KY, Usman AA, Sukat FD, Abdulrahman M (2023) A novel hybrid autoencoder and modified particle swarm optimization feature selection for intrusion detection in the internet of things network. Front Comput Sci. https://doi.org/10.3389/fcomp.2023.997159

    Article  Google Scholar 

  3. Saheed YK, Misra S (2024) A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things. Int J Inf Secur. https://doi.org/10.1007/s10207-023-00803-x

    Article  Google Scholar 

  4. Alshammari BM (2023) AIBPSF-IoMT: artificial intelligence and blockchain-based predictive security framework for IoMT technologies. Electronics 12(23):4806

    Article  Google Scholar 

  5. Shrestha A, Mahmood A (2019) Review of deep learning algorithms and architectures. IEEE Access 7:53040–53065

    Article  Google Scholar 

  6. Alzubaidi L, Zhang J, Humaidi AJ, Al-Dujaili A, Duan Y, Al-Shamma O, Santamaría J, Fadhel MA, Al-Amidie M, Farhan L (2021) Review of deep learning: concepts, CNN architectures, challenges, applications, future directions. J Big Data 8:1–74

    Article  Google Scholar 

  7. Ayyoubzadeh SM, Ayyoubzadeh SM, Zahedi H, Ahmadi M, Kalhori SRN (2020) Predicting COVID-19 incidence through analysis of google trends data in Iran: data mining and deep learning pilot study. JMIR Public Health Surveill 6(2):e18828

    Article  Google Scholar 

  8. Ahmad RW, Salah K, Jayaraman R, Yaqoob I, Ellahham S, Omar M (2021) The role of blockchain technology in telehealth and telemedicine. Int J Med Inform 148:104399

    Article  Google Scholar 

  9. Afaq Y, Manocha A (2023) Blockchain and deep learning integration for various application: a review. J Comput Inf Syst. https://doi.org/10.1080/08874417.2023.2173330

    Article  Google Scholar 

  10. Shafay M, Ahmad RW, Salah K, Yaqoob I, Jayaraman R, Omar M (2023) Blockchain for deep learning: review and open challenges. Clust Comput 26(1):197–221

    Article  Google Scholar 

  11. Khubrani MM (2023) Artificial rabbits optimizer with deep learning model for blockchain-assisted secure smart healthcare system. Int J Adv Comput Sci Appl. https://doi.org/10.14569/IJACSA.2023.0140998

    Article  Google Scholar 

  12. Srinivasu PN, Bhoi AK, Nayak SR, Bhutta MR, Woźniak M (2021) Blockchain technology for secured healthcare data communication among the non-terminal nodes in IoT architecture in 5G network. Electronics 10(12):1437

    Article  Google Scholar 

  13. Zheng Z, Xie S, Dai HN, Chen W, Chen X, Weng J, Imran M (2020) An overview on smart contracts: challenges, advances and platforms. Future Gener Comput Syst 105:475–491

    Article  Google Scholar 

  14. Mudassir M, Unal D, Hammoudeh M, Azzedin F (2022) Detection of botnet attacks against industrial IoT systems by multilayer deep learning approaches. Wirel Commun Mob Comput. https://doi.org/10.1155/2022/2845446

    Article  Google Scholar 

  15. Azbeg K, Ouchetto O, Andaloussi SJ (2022) BlockMedCare: a healthcare system based on IoT, Blockchain and IPFS for data management security. Egypt Inform J 23(2):329–343

    Article  Google Scholar 

  16. Sudhakaran P (2022) Energy efficient distributed lightweight authentication and encryption technique for IoT security. Int J Commun Syst 35(2):e4198

    Article  Google Scholar 

  17. Yin C, Zhang S, Wang J, Xiong NN (2020) Anomaly detection based on convolutional recurrent autoencoder for IoT time series. IEEE Trans Syst Man Cybern Syst 52(1):112–122

    Article  Google Scholar 

  18. Xu Z, Liang W, Li KC, Xu J, Jin H (2021) A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles. J Parallel Distrib Comput 149:29–39

    Article  Google Scholar 

  19. Liang W, Ning Z, Xie S, Hu Y, Lu S, Zhang D (2021) Secure fusion approach for the internet of things in smart autonomous multi-robot systems. Inf Sci 579:468–482

    Article  MathSciNet  Google Scholar 

  20. Khalaf OI, Abdulsahib GM (2021) Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks. Peer Peer Netw Appl 14:2858–2873

    Article  Google Scholar 

  21. Zhang J (2021) Distributed network security framework of energy internet based on internet of things. Sustain Energy Technol Assess 44:101051

    Google Scholar 

  22. Li Y, Chen C, Liu N, Huang H, Zheng Z, Yan Q (2020) A blockchain-based decentralized federated learning framework with committee consensus. IEEE Netw 35(1):234–241

    Article  Google Scholar 

  23. Philip AO, Saravanaguru RK (2020) Secure incident & evidence management framework (SIEMF) for internet of vehicles using deep learning and blockchain. Open Comput Sci 10(1):408–421

    Article  Google Scholar 

  24. AlKadi O, Moustafa N, Turnbull B, Choo KKR (2019) Mixture localization-based outliers models for securing data migration in cloud centers. IEEE Access 7:114607–114618

    Article  Google Scholar 

  25. Liang G, Weller SR, Luo F, Zhao J, Dong ZY (2018) Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Trans Smart Grid 10(3):3162–3173

    Article  Google Scholar 

  26. Liu X, Muhammad K, Lloret J, Chen YW, Yuan SM (2019) Elastic and cost-effective data carrier architecture for smart contract in blockchain. Future Gener Comput Syst 100:590–599

    Article  Google Scholar 

  27. Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89

    Article  Google Scholar 

  28. Wang Z (2018) Deep learning-based intrusion detection with adversaries. IEEE Access 6:38367–38384

    Article  Google Scholar 

  29. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium On Computational Intelligence for Security and Defense Applications. IEEE, pp 1–6

  30. Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, pp 1–6

  31. Hady AA, Ghubaish A, Salman T, Unal D, Jain R (2020) Intrusion detection system for healthcare systems using medical and network data: a comparison study. IEEE Access 8:106576–106584

    Article  Google Scholar 

  32. Al-Qarafi A, Alrowais F, Alotaibi S, Nemri N, Al-Wesabi FN, Al Duhayyim M, Marzouk R, Othman M, Al-Shabi M (2022) Optimal machine learning based privacy preserving blockchain assisted internet of things with smart cities environment. Appl Sci 12:5893

    Article  Google Scholar 

  33. Alohali MA, Al-Wesabi FN, Hilal AM, Goel S, Gupta D, Khanna A (2022) Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment. Cogn Neurodyn 16(5):1045–1057

    Article  Google Scholar 

Download references

Acknowledgements

Dear Editors-in-Chief, Prof. Hamid R. Arabnia We are grateful to the editors and reviewers for their time and constructive comments on our manuscript: Fusion of Machine Learning and Blockchain-based Privacy-Preserving Approach for Health Care Data in the Internet of Things. We have implemented their comments and suggestions and wish to submit a revised version of the manuscript for further consideration in the journal. Changes in the initial version of the manuscript are highlighted for added sentences. Below, we also provide a point-by-point response explaining how we have addressed each of the editor’s or reviewers’ comments. We look forward to the outcome of your assessment. Kind regards, Seyyed Hamid Ghafouri, Ph.D.

Funding

No funds.

Author information

Authors and Affiliations

Authors

Contributions

Behnam Rezaei Bezanjani contributed to the conceptualization, data curation, investigation, methodology, resources, software, validation, visualization, writing—original draft, and writing—review and editing. Seyyed Hamid Ghafouri was involved in the formal analysis, investigation, methodology, resources, software, supervision, visualization, and writing—review and editing.

Corresponding author

Correspondence to Seyyed Hamid Ghafouri.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Ethical approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bezanjani, B.R., Ghafouri, S.H. & Gholamrezaei, R. Fusion of machine learning and blockchain-based privacy-preserving approach for healthcare data in the Internet of Things. J Supercomput 80, 24975–25003 (2024). https://doi.org/10.1007/s11227-024-06392-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-024-06392-3

Keywords