Skip to main content

Advertisement

Log in

RETRACTED ARTICLE: Cloud- and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseases

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

This article was retracted on 28 December 2022

This article has been updated

Abstract

Internet of Things (IoT)-enabled e-healthcare applications are contributing more to the society for providing healthcare monitoring services efficiently in smart environment. Security of healthcare system is to be considered as an important issue due to the huge volume of users and their secret data availability in this fast internet era and cloud databases. To store the patient’s health data securely in the form of electronic version raises the concerns about the patient data privacy and security. Moreover, handling volume of data is also very complex task today with normal classifiers. For this purpose, many deep learning algorithms are available for classifying the huge volume of data successfully. For these all purposes, we propose a new healthcare monitoring system to monitor the disease level by predicting the diseases according to the original data that are collected from the patients who are available in remote places. Moreover, we propose a secured data storage model for storing the patient’s data securely in cloud databases. Here, we introduce two new cryptographic algorithms for performing encryption and decryption processes. The experiments have been conducted for evaluating the performance of health monitoring system according to the particular diseases such as heart and diabetic diseases. This work considered the UCI medical dataset and the data collected from patients whose are available remotely through IoT devices. The proposed system is evaluated based on sensitivity, specificity, F-measure and prediction accuracy. The experimental results demonstrate that the proposed system outperforms the existing e-healthcare systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Change history

References

  • Ahmad, N (2009) Restrictions on cryptography in India – a case studyof encryption and privacy. Computer Law Security Review 25(2):173–180

    Article  Google Scholar 

  • Alqahtani F, Al-Makhadmeh Z, Tolba A, Said O (2020) TBM: a trust-based monitoring security scheme to improve the service authentication in the internet of things communications. Comput Commun 150:216–225

    Article  Google Scholar 

  • Babu GC, Shantharajah SP (2019) Optimal body mass index cutoff point for cardiovascular disease and high blood pressure. Neural Comput Appl 31(5):1585–1594

    Article  Google Scholar 

  • Belotti M, Božić N, Pujolle G, Secci S (2019) Cedric, Cnam, Paris, France, “A vademecum on blockchain technologies: when, which, and how.” IEEE Communications Surveys & Tutorials 21(4):3796–3838

    Article  Google Scholar 

  • Breast cancer using fuzzy temporal rules", National Academy Science Letters, 42: 227-232 2019

  • Chou DC, Chou AY (2002) Healthcare information portal: a web technology for the healthcare community. Technol Soc 24(3):317–330

    Article  Google Scholar 

  • Elias Yaacoub, Khalid Abualsaud, Tamer Khattab, Mohsen Guizani, Ali Chehab, 2019 "Secure mHealth IoT data transfer from the patient to the hospital: a three-tier approach", IEEE Wireless Communications, 26(5): 70–76

  • Francis H (2007) Roger France, Marc Bangels, Etienne De Clercq, “Purposes of health identification cards and role of a secure access platform (Be-Health) in Belgium.” Int J Med Informatics 76(2–3):84–88

    Article  Google Scholar 

  • Ganapathy S, Sethukkarasi R, Yogesh P, Vijayakumar P, Kannan A (2014) An intelligent temporal pattern classification system using fuzzy temporal rules and particle swarm optimization. Sadhana 39(2):283–302

    Article  MathSciNet  MATH  Google Scholar 

  • Gautami Tripathi, Mohd Abdul, Ahada Sara Paiva, "S2HS- A blockchain based approach for smart healthcare system", Healthcare, Article No. 100391, 2019

  • Geylani Kardas E, TurhanTunali, (2006) Design and implementation of a smart card based healthcare information system. Comput Methods Programs Biomed 81(1):66

    Article  Google Scholar 

  • Huang L-C, Chu H-C, Lien C-Y, Hsiao C-H, Kao T (2009) Privacy preservation and information security protection for patients’ portable electronic health records. Comput Biol Med 39(9):743–750

    Article  Google Scholar 

  • Hussein AF, Arun Kumar N, Burbano-Fernandez M, Ramírez-González G, Abdulhay E, Victor HC, Albuquerque De (2018) An automated remote cloud-based heart rate variability monitoring system. IEEE Access 6:77055–77064

    Article  Google Scholar 

  • Kanimozhi U, Ganapathy S, Manjula D, Kannan A (2019) An intelligent risk prediction system for breast cancer using fuzzy temporal rules. National Academy Science Letters 42:227–232

    Article  Google Scholar 

  • Kumar PM, Lokesh S, Varatharajan R, Babu GC, Parthasarathy P (2018) Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier. Futur Gener Comput Syst 86:527–534

    Article  Google Scholar 

  • Kumarage H, Khalil I, Alabdulatif A, Tari Z, Yi X (2016) Secure data analytics for cloud-integrated internet of things applications. IEEE Cloud Computing 3(2):46–56

    Article  Google Scholar 

  • Kwabena O-A, Qin Z, Zhuang T, Qin Z (2019) MSCryptoNet: multi-scheme privacy-preserving deep learning in cloud computing. IEEE Access 7:29344–32935

    Article  Google Scholar 

  • Lake Bu, Mihailo Isakov , Michel A. Kinsy, 2019 "A secure and robust scheme for sharing confidential information in IoT systems", Ad Hoc Networks, 92: 101762.

  • Li T, Gao C, Jiang L, Pedrycz W, Shen J (2019) Publicly verifiable privacy-preserving aggregation and its application in IoT. J Netw Comput Appl 126:39–44

    Article  Google Scholar 

  • Liang X, Barua M, Rongxing Lu, Lin X (2012) Xuemin (Sherman) Shen, “HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks.” Comput Commun 35(15):1910–1920

    Article  Google Scholar 

  • Mahmud Hossain SM, Islam R, Ali F, Kwak K-S, Hasan R (2018) An internet of things-based health prescription assistant and its security system design. Futur Gener Comput Syst 82:422–439

    Article  Google Scholar 

  • Manogaran G, Shakeel PM, Hassanein AS, Kumar PM, Babu GC (2018a) Machine learning approach-based gamma distribution for brain tumor detection and data sample imbalance analysis. IEEE Access 7:12–19

    Article  Google Scholar 

  • Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C (2018b) A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting system. Futur Gener Comput Syst 82:375–387

    Article  Google Scholar 

  • Omnia Abu Waraga, Meriem Bettayeb, Qassim Nasir, Manar Abu Talib, "Design and implementation of automated IoT security testbed", Computers & Security, Vol. 88, Article No. 101648, pp. 1–17, 2020.

  • O’Donovan P, Gallagher C, Leahy K, O’Sullivan DTJ (2019) A comparison of fog and cloud computing cyber-physical interfaces for Industry 4.0 real-time embedded machine learning engineering applications. Comput Ind 110:12–35

    Article  Google Scholar 

  • Prabhu B, kavin, S Ganapathy, (2019) A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Comput Netw 151:190

    Google Scholar 

  • Qingchen Zhang, Laurence T. Yang, Zhikui Chen, Peng Li, M. Jamal Deen, (2018). "Privacy-preserving double-projection deep computation model with crowdsourcing on cloud for big data feature learning", IEEE Internet of Things Journal, 5: 4, 2896–2903,

  • Roan Thi Ngan, Mumtaz Ali, Hamido Fujita, Nguyen Long Giang, Gunasekaran Manogaran, MK Priyan, 2019 "A new representation of intuitionistic fuzzy systems and their applications in critical decision making", IEEE Intelligent Systems.

  • Samet S, Miri A (2012) Privacy-preserving back-propagation and extreme learning machine algorithms. Data Knowl Eng 79(80):40–61

    Article  Google Scholar 

  • Selvi M, Thangaramya K, Saranya MS, Kulothungan K, Ganapathy S, Kannan A (2019) Classification of Medical Dataset Along with Topic Modeling Using LDA. Nanoelectronics, Circuits and Communication Systems, Springer, pp 1–11

    Google Scholar 

  • Sethukkarasi R, Ganapathy S, Yogesh P, Kannan A (2014) An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns. Journal of Intelligent & Fuzzy Systems 26(3):1167–1178

    Article  MATH  Google Scholar 

  • Shangping Wang Xu, Wang YZ (2019) A secure cloud storage framework with access control based on blockchain. IEEE Access 7:112713–112724

    Article  Google Scholar 

  • Shen M, Ma B, Zhu L, Xiaojiang Du, Ke Xu (2019a) Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT. IEEE Internet Things J 6(2):1998–2008

    Article  Google Scholar 

  • Shen M, Tang X, Zhu L, Xiaojiang Du, Guizani M (2019b) Privacy-preserving support vector machine training over blockchain-based encrypted iot data in smart Cities. IEEE Internet Things J 6(5):7702–7712

    Article  Google Scholar 

  • Sivakumar Krishnan, S. Lokesh, M. Ramya Devi, "An efficient Elman neural network classifier with cloud supported internet of things structure for health monitoring system", Computer Networks, Vol. 151, pp. 201–210, 2019.

  • Smith E, J.H.PE loff, (1999) Security in health-care information systems—current trends. Int J Med Informatics 54(1):39–54

    Article  Google Scholar 

  • Tuli S, Basumatarya N, SinghGill S, Kahani M, Arya RC, SinghWander G, Buyya R (2020) HealthFog: an ensemble deep learning based smart healthcare system for automatic diagnosis of heart diseases in integrated IoT and fog computing environments. Futur Gener Comput Syst 104:187–200

    Article  Google Scholar 

  • Vadavalli AK, Subhashini R (2018) ECDH-ECC: A combination of elliptic curve cryptography and diffie hellman based cryptography technique for big data security. Journal of Engineering and Applied Sciences 13(15):6043–6052

    Google Scholar 

  • Verma P, Sood SK (2018) Cloud-centric IoT based disease diagnosis healthcare framework. Journal of Parallel and Distributed Computing 116:27–38

    Article  Google Scholar 

  • William Stallings, “Cryptography and network Security: Principles and Practice”, Pearson Education/Prentice Hall, 5th Edition.

  • Zisang Xu, Cheng Xu, Wei Liang, Jianbo Xu, And Haixian Chen, 2019 "A lightweight mutual authentication and key agreement scheme for medical internet of things", 7: 53922–53931

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyan Malarvizhi Kumar.

Ethics declarations

Conflict of interest

The author declares that they no conflict of interest. The author of this research acknowledges that they are not involved in any financial interest.

Additional information

Communicated by Vicente Garcia Diaz.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s00500-022-07783-5"

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Malarvizhi Kumar, P., Hong, C., Chandra Babu, G. et al. RETRACTED ARTICLE: Cloud- and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseases. Soft Comput 25, 12159–12174 (2021). https://doi.org/10.1007/s00500-021-05866-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-05866-3

Keywords

Navigation