Managing Security of Healthcare Data for a Modern Healthcare System
Abstract
:1. Introduction
- ▪
- Gather the IoT-sensed data of COVID patients from different remote areas.
- ▪
- Apply the LRO-based serpent (S) encryption algorithm to secure data transmission.
- ▪
- The asymmetric hash signature function is validated for key validations from the sender and receiver.
- ▪
- Investigate the effectiveness of the proposed system using various parameter metrics.
2. Related Work
3. Proposed Methodology
3.1. Lionized Remora Optimization
3.2. Serpent Security Strategy
3.3. Asymmetric Hash Signature
4. Result and Discussion
4.1. Performance Analysis
4.2. Encryption Time
4.3. Decryption Time
4.4. Key Generation
4.5. Key Size
4.6. Confidential Rate
4.7. Resource Optimization
4.8. Execution Time and Delay
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Land, K.J.; Boeras, D.I.; Chen, X.-S.; Ramsay, A.R.; Peeling, R.W. REASSURED diagnostics to inform disease control strategies, strengthen health systems and improve patient outcomes. Nat. Microbiol. 2019, 4, 46–54. [Google Scholar] [CrossRef]
- Marques, G.; Pitarma, R.M.; Garcia, N.; Pombo, N. Internet of things architectures, technologies, applications, challenges, and future directions for enhanced living environments and healthcare systems: A review. Electronics 2019, 8, 1081. [Google Scholar] [CrossRef] [Green Version]
- Shafique, K.; Khawaja, B.A.; Sabir, F.; Qazi, S.; Mustaqim, M. Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access 2020, 8, 23022–23040. [Google Scholar] [CrossRef]
- Mansour, R.F.; El Amraoui, A.; Nouaouri, I.; Diaz, V.G.; Gupta, D.; Kumar, S. Artificial intelligence and internet of things enabled disease diagnosis model for smart healthcare systems. IEEE Access 2021, 9, 45137–45146. [Google Scholar] [CrossRef]
- Zeadally, S.; Siddiqui, F.; Baig, Z.; Ibrahim, A. Smart healthcare: Challenges and potential solutions using internet of things (IoT) and big data analytics. PSU Res. Rev. 2020, 4, 149–168. [Google Scholar] [CrossRef] [Green Version]
- Zhu, H.; Wu, C.K.; Koo, C.H.; Tsang, Y.T.; Liu, Y.; Chi, H.R.; Tsang, K.-F. Smart healthcare in the era of internet-of-things. IEEE Consum. Electron. Mag. 2019, 8, 26–30. [Google Scholar] [CrossRef]
- Chen, H.; Khan, S.; Kou, B.; Nazir, S.; Liu, W.; Hussain, A. A smart machine learning model for the detection of brain hemorrhage diagnosis based internet of things in smart cities. Complexity 2020, 2020, 3047869. [Google Scholar] [CrossRef]
- Ennafiri, M.; Mazri, T. Internet of things for smart healthcare: A review on a potential IOT based system and technologies to control COVID-19 pandemic. In Innovations in Smart Cities Applications Volume 4: The Proceedings of the 5th International Conference on Smart City Applications; Springer International Publishing: Cham, Switzerland, 2021. [Google Scholar]
- Malikov, M.R.; Rustamov, A.A.; Ne’matov, N.I. Strategies for Development of Medical Information Systems. Theor. Appl. Sci. 2020, 89, 388–392. [Google Scholar] [CrossRef]
- Kelly, J.T.; Campbell, K.L.; Gong, E.; Scuffham, P. The Internet of Things: Impact and implications for health care delivery. J. Med. Internet Res. 2020, 22, e20135. [Google Scholar] [CrossRef]
- Javaid, M.; Khan, I.H. Internet of Things (IoT) enabled healthcare helps to take the challenges of COVID-19 Pandemic. J. Oral Biol. Craniofacial Res. 2021, 11, 209–214. [Google Scholar] [CrossRef] [PubMed]
- Serna, S. The Increase of Ransomware Attacks within the Healthcare and Education Sector. Ph.D. Thesis, Utica University, Utica, NY, USA, 2022. [Google Scholar]
- Buzdugan, A. Integration of cyber security in healthcare equipment. In Proceedings of the 4th International Conference on Nanotechnologies and Biomedical Engineering: Proceedings of ICNBME-2019, Chisinau, Moldova, 18–21 September 2019; Springer International Publishing: Cham, Switzerland, 2020; pp. 681–684. [Google Scholar]
- Scott, C.R. Comparing Cybercrime in Banking and Healthcare Sectors. Ph.D. Thesis, Utica University, Utica, NY, USA, 2022. [Google Scholar]
- Richardson, R.; North, M.M.; Garofalo, D. Ransomware: The landscape is shifting-a concise report. Int. Manag. Rev. 2021, 17, 5–86. [Google Scholar]
- Minnaar, A.; Herbig, F.J. Cyberattacks and the cybercrime threat of ransomware to hospitals and healthcare services during the COVID-19 pandemic. Acta Criminol. Afr. J. Criminol. Vict. 2021, 34, 155–185. [Google Scholar]
- Ma, K.W.F.; McKinnon, T. COVID-19 and cyber fraud: Emerging threats during the pandemic. J. Financ. Crime 2022, 29, 433–446. [Google Scholar] [CrossRef]
- Alam, T.; Benaida, M. Internet of things and blockchain-based framework for Coronavirus (COVID-19) disease. Int. J. Online Biomed. Eng. 2022, 18, 82–94. [Google Scholar] [CrossRef]
- Mukati, N.; Namdev, N.; Dilip, R.; Hemalatha, N.; Dhiman, V.; Sahu, B. Healthcare assistance to COVID-19 patient using internet of things (IoT) enabled technologies. Mater. Today Proc. 2021, in press. [CrossRef] [PubMed]
- Zhang, C.; Lu, Y. Study on artificial intelligence: The state of the art and future prospects. J. Ind. Inf. Integr. 2021, 23, 100224. [Google Scholar] [CrossRef]
- Greco, L.; Percannella, G.; Ritrovato, P.; Tortorella, F.; Vento, M. Trends in IoT based solutions for health care: Moving AI to the edge. Pattern Recognit. Lett. 2020, 135, 346–353. [Google Scholar] [CrossRef]
- Hameed, K.; Bajwa, I.S.; Ramzan, S.; Anwar, W.; Khan, A. An intelligent IoT based healthcare system using fuzzy neural networks. Sci. Program. 2020, 2020, 8836927. [Google Scholar] [CrossRef]
- Secinaro, S.; Calandra, D.; Secinaro, A.; Muthurangu, V.; Biancone, P. The role of artificial intelligence in healthcare: A structured literature review. BMC Med. Inform. Decis. Mak. 2021, 21, 125. [Google Scholar] [CrossRef]
- Awotunde, J.B.; Misra, S. Feature extraction and artificial intelligence-based intrusion detection model for a secure internet of things networks. In Illumination of Artificial Intelligence in Cybersecurity and Forensics; Springer International Publishing: Cham, Switzerland, 2022; pp. 21–44. [Google Scholar]
- Puri, V.; Kataria, A.; Sharma, V. Artificial intelligence-powered decentralized framework for Internet of Things in Healthcare 4.0. Trans. Emerg. Telecommun. Technol. 2021, e4245. [Google Scholar] [CrossRef]
- Othman, S.B.; Almalki, F.A.; Chakraborty, C.; Sakli, H. Privacy-preserving aware data aggregation for IoT-based healthcare with green computing technologies. Comput. Electr. Eng. 2022, 101, 108025. [Google Scholar] [CrossRef]
- Rawat, R.; Mahor, V.; Garg, B.; Chouhan, M.; Pachlasiya, K.; Telang, S. Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID. In Lessons from COVID-19; Academic Press: Cambridge, MA, USA, 2022; pp. 405–425. [Google Scholar]
- Sarosh, P.; Parah, S.A.; Bhat, G.M. An efficient image encryption scheme for healthcare applications. Multimed. Tools Appl. 2022, 81, 7253–7270. [Google Scholar] [CrossRef] [PubMed]
- Rani, S.; Chauhan, M.; Kataria, A.; Khang, A. IoT equipped intelligent distributed framework for smart healthcare systems. arXiv 2022, arXiv:2110.04997. [Google Scholar]
- Thilagam, K.; Beno, A.; Lakshmi, M.V.; Wilfred, C.B.; George, S.M.; Karthikeyan, M.; Peroumal, V.; Ramesh, C.; Karunakaran, P. Secure IoT Healthcare Architecture with Deep Learning-Based Access Control System. J. Nanomater. 2022, 2022, 2638613. [Google Scholar] [CrossRef]
- Ali, A.; Pasha, M.F.; Ali, J.; Fang, O.H.; Masud, M.; Jurcut, A.D.; Alzain, M.A. Deep learning based homomorphic secure search-able encryption for keyword search in blockchain healthcare system: A novel approach to cryptography. Sensors 2022, 22, 528. [Google Scholar] [CrossRef]
- Kumar, R.; Kumar, P.; Tripathi, R.; Gupta, G.P.; Islam, A.K.M.N.; Shorfuzzaman, M. Permissioned Blockchain and Deep Learning for Secure and Efficient Data Sharing in Industrial Healthcare Systems. IEEE Trans. Ind. Inform. 2022, 18, 8065–8073. [Google Scholar] [CrossRef]
- Kute, S.S.; Tyagi, A.K.; Aswathy, S.U. Security, privacy and trust issues in internet of things and machine learning based e-healthcare. In Intelligent Interactive Multimedia Systems for E-Healthcare Applications; Springer: Singapore, 2022; pp. 291–317. [Google Scholar]
- Ali, A.; Almaiah, M.A.; Hajjej, F.; Pasha, M.F.; Fang, O.H.; Khan, R.; Teo, J.; Zakarya, M. An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors 2022, 22, 572. [Google Scholar] [CrossRef]
- Anuradha, M.; Jayasankar, T.; Prakash, N.; Sikkandar, M.Y.; Hemalakshmi, G.; Bharatiraja, C.; Britto, A.S.F. IoT enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess. Microsyst. 2021, 80, 103301. [Google Scholar] [CrossRef]
- Satyanarayana, T.V.V.; Roopa, Y.M.; Maheswari, M.; Patil, M.B.; Tamrakar, A.K.; Shankar, B.P. A secured IoT-based model for human health through sensor data. Meas. Sens. 2022, 24, 100516. [Google Scholar] [CrossRef]
- Zulkifl, Z.; Khan, F.; Tahir, S.; Afzal, M.; Iqbal, W.; Rehman, A.; Saeed, S.; Almuhaideb, A.M. FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs. IEEE Access 2022, 10, 15644–15656. [Google Scholar] [CrossRef]
- Das, S.; Namasudra, S. Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare. Trans. Emerg. Telecommun. Technol. 2023, e4716. [Google Scholar] [CrossRef]
- Jemal, J.M. Managing Inventory: A Study of Databases and Database Management Systems; Senior Independent Study Theses, Paper 9044; The College of Wooster: Wooster, OH, USA, 2020. [Google Scholar]
Reference | Methods | Systems | Key Results | Advantages | Limitations |
---|---|---|---|---|---|
Thilagam, K. et al. [30] | CNN | Private healthcare data | Accuracy, Recall, F1-score, Precision, False Alarm Rate, and Missed Detection Rate. | Data integrity and privacy leaks are both minimal. | High time and cost consumption. |
Ali, Aitizaz et al. [31] | homomorphic encryption | Digital healthcare | Throughput, encryption time, decryption time, latency, and computational cost. | Gives consumers more flexibility. | The loss function is high. |
Kumar, Randhir et al. [32] | PBDL (SSVAE and SA-BiLSTM) | Industrial healthcare | Transmission efficiency, encryption and decryption time, accuracy, and loss. | Secured authenticated data transmission and attack detection. | More extended training period and slower prototype. |
Kute, Shruti Suhas et al. [33] | Machine learning | IoT-based healthcare | Accuracy, loss, and confidential rate. | Effective validation is achieved for different sickness. | Need to address real-time challenges. |
Ali, Aitizaz et al. [34] | GT-BSS | Digital healthcare | Throughput, encryption time, decryption time, latency, and computational cost. | Limits security problems to patient data. | Very low test accuracy. |
Anuradha, M. et al. [35] | AES | Cancer prediction system | Cost and time. | High-security function. | A small amount of data is considered for validation. |
Satyanarayana, T.V.V. et al. [36] | BSN | Medical system | CPU cycles and execution time. | Security needs are effectively solved. | Very few metrics are validated for the performance evaluation. |
Zulkifl, Z., Khan et al. [37] | FBASHI | Hospital department | Latency and throughput. | Different kinds of attacks are evaluated. | Lack of evaluation metrics. |
Das, S. and Namasudra [38]. | Lightweight cryptographic primitives | Healthcare center | Computation cost and execution time. | Feasible for lightweight and low resource IoT gadgets. | Only applicable for low resource IoT gadgets and systems. Additionally, less data. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Almalawi, A.; Khan, A.I.; Alsolami, F.; Abushark, Y.B.; Alfakeeh, A.S. Managing Security of Healthcare Data for a Modern Healthcare System. Sensors 2023, 23, 3612. https://doi.org/10.3390/s23073612
Almalawi A, Khan AI, Alsolami F, Abushark YB, Alfakeeh AS. Managing Security of Healthcare Data for a Modern Healthcare System. Sensors. 2023; 23(7):3612. https://doi.org/10.3390/s23073612
Chicago/Turabian StyleAlmalawi, Abdulmohsen, Asif Irshad Khan, Fawaz Alsolami, Yoosef B. Abushark, and Ahmed S. Alfakeeh. 2023. "Managing Security of Healthcare Data for a Modern Healthcare System" Sensors 23, no. 7: 3612. https://doi.org/10.3390/s23073612
APA StyleAlmalawi, A., Khan, A. I., Alsolami, F., Abushark, Y. B., & Alfakeeh, A. S. (2023). Managing Security of Healthcare Data for a Modern Healthcare System. Sensors, 23(7), 3612. https://doi.org/10.3390/s23073612