Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things
Main Article Content
Abstract
Protecting patient data in the Internet of Medical Things (IoMT) is one of the major challenges facing healthcare organizations because of increasing threats to privacy and security. Although there are many existing protocols and solutions, such as Rivest–Shamir–Adleman (RSA) and El-Gamal cryptographies or centralized methods, that aim to protect data, they suffer from weaknesses such as slow performance or inability to handle large volumes of data. The issue of security in medical records has become an urgent need, and the use of centralized methods can expose them to single-point failure. In this paper, we present the efficient approach to securing patient information (EASPI), which depends on blockchain and integrates innovative techniques such as the advanced encryption algorithm (AES), reverse word frequency analysis (TF-IDF), Lemplel-Ziv-Welch (LZW), decision tree model (DTM), and naive Bayes classifier (NBC). EASPI seeks to improve the security of medical data by storing it encrypted and securely via blockchain technology, providing a high level of privacy and reliability. The experimental results indicate that the EASPI reduces the encryption execution time to 0.2 ms and the decryption execution time to 0.3 ms while improving the accuracy of medical diagnosis. The potential of the suggested methods for healthcare systems is further demonstrated by the fact that the TF-IDF algorithm attained an execution time of 0.004 ms, while the blockchain's greatest execution time was 0.014 ms. Additionally, using the formal verification Scyther tool, the security of the suggested system is examined both theoretically and practically. The suggested solution is an appropriate option for healthcare institutions since it offers a strong defense against a range of cyber threats, including targeted and espionage assaults.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
N. Alsaeed, F. Nadeem, and F. Faisal Albalwy, "A scalable and lightweight group authentication framework for Internet of medical things using integrated blockchain and fog computing," Future Generation Computer Systems, 151(2024) 162-181, 2024. https://doi.org/10.1016/j.future.2023.09.032.
D. Ngabo, D. Wang, C. Iwendi, J. H. Anajemba, L. A. Ajao, and C. Biamba, "Blockchain-based security mechanism for the medical data at fog computing architecture of Internet of Things," electronics, 10, 2110, 2021. https://doi.org/10.3390/electronics10172110.
D. H. Tahayur, and M. Al-Zubaidie, "Enhancing electronic agriculture data security with a blockchain-based search method and e-signatures," Mesopotamian Journal of CyberSecurity, 4(3), 129-149, 2024. https://doi.org/10.58496/MJCS/2024/012.
M. S. A. Muthanna, R. Alkanhel, A. Muthanna, A. Rafiq, and W. A. M. Abdullah, "Towards SDNenabled, intelligent intrusion detection system for internet of things (IoT)," IEEE Access, vol. 10, pp. 22756–22768, 2022. https://doi.org/10.1109/ACCESS.2022.3153716.
R. U. Rasool, H. A. F. Ahmad, W. Rafique, A. Qayyum, and J. Qadir, "Security and privacy of internet of medical things: A contemporary review in the age of surveillance," botnets, and adversarial ML. Journal of Network and Computer Applications, 201, 103332, 2022. https://doi.org/10.1016/j.jnca.2022.103332.
FORESCOUT, "The 5 riskiest connected devices in 2023: IT, IoT, OT, IoMT," Forescout Research - Vedere Labs, 2023. https://www.forescout.com/blog/riskiest-connected-devices-it-iot-ot-iomt/
R. H. Razzaq, M. Al-Zubaidie, "Formulating an advanced security protocol for Internet of medical Things based on blockchain and fog computing technologies," Iraqi Journal for Computer Science and Mathematics 5 (3), 723-734, 2024. https://doi.org/10.52866/ijcsm.2024.05.03.046.
A. Xiang, H. Gao, Y. Tian, L. Wang, and J. Xiong, "Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT," Computer Networks, 246, 110425, 2024. https://doi.org/10.1016/j.comnet.2024.110425.
A. Ghubaish, T. Salman, M. Zolanvari, D. Unal, A. Al-Ali, and R. Jain, "Recent advances in the Internet-of-medical-things (IoMT) systems security," IEEE Internet of Things Journal, 8(11), 8707-8718, 2020. https://doi.org/10.1109/JIOT.2020.3045653.
S. A. Yousiff, R. A. Muhajjar, and M. Al-Zubaidie, "Designing a blockchain approach to secure firefighting stations based Internet of things," Informatica, 47(10), 2023. https://doi.org/10.31449/inf.v47i10.5395.
P. Bagga, A. K. Das, V. Chamola, and M. Guizani,"Blockchain-envisioned access control for internet of things applications: A comprehensive survey and future directions," Telecommunication Systems, vol. 81, no. 1, pp. 125–173, 2022. https://doi.org/10.1007/s11235-022-00938-7.
M. Al-Zubaidie, and W. A. Jebbar, "Providing security for flash loan system using cryptocurrency wallets supported by XSalsa20 in a blockchain environment," Applied Sciences, 14(14), 6361, 2024. https://doi.org/10.3390/app14146361.
G. S. Shyaa, and M. Al-Zubaidie, "Utilizing trusted lightweight ciphers to support electronic-commerce transaction cryptography," Applied Sciences, 13(12), 7085, 2023. https://doi.org/10.3390/app13127085.
J. Jeyavel, T. Parameswaran, J. M. Mannan, and U. Hariharan, "Security vulnerabilities and intelligent solutions for IoMT systems," Internet of Medical Things: Remote Healthcare Systems and Applications, 175-194, 2021. https://doi.org/10.1007/978-3-030-63937-2_10.
M. Al-Zubaidie, and R. A. Muhajjar, "Integrating Trustworthy Mechanisms to Support Data and Information Security in Health Sensors," Procedia Computer Science, 237, 43-52, 2024. https://doi.org/10.1016/j.procs.2024.05.078.
M. Al-Zubaidie,"Implication of lightweight and robust hash function to support key exchange in health sensor networks," Symmetry, 15(1), 152, 2023. https://doi.org/10.3390/sym15010152.
S. Shukla, S. Thakur, S. Hussain, J. G. Breslin, and S. M. Jameel, "Identification and authentication in healthcare Internet-of-things using integrated fog computing based blockchain model," Internet of Things, 15, 100422, 2021. https://doi.org/10.1016/j.iot.2021.100422.
V. O. Nyangaresi, "Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks," Ad Hoc Networks, Volume 142, 1 April 2023, 103117. https://www.sciencedirect.com/science/article/abs/pii/S1570870523000379.
V. O. Nyangaresi, K. A.-A Mutlaq ,Z. A. Abduljabbar, M. A. Hussain, Z. A. Hussien, "Forward and backward key secrecy preservation scheme for medical Internet of things," Human-Centric Smart Computing, vol 316, 2022. https://link.springer.com/chapter/10.1007/978-981-19-5403-0_2.
L. Ning, Y. Ali, H. Ke, S. Nazir, and Z. Huanli, "A hybrid MCDM approach of selecting lightweight cryptographic cipher based on ISO and NIST lightweight cryptography security requirements for Internet of health Things," IEEE Access, vol. 8, pp. 220165–220187, 2020. https://doi.org/10.1109/ACCESS.2020.3041327.
A. Raj, and S. Prakash, "Privacy preservation of the Internet of medical Things using blockchain," Health Services and Outcomes Research Methodology, pp. 1–28, 2023. https://doi.org/10.1007/s10742-023-00306-1.
A. Rehman, S. Abbas, M. A. Khan, T. M. Ghazal, K. M. Adnan, and A. Mosavi, "A secure healthcare 5.0 system based on blockchain technology entangled with federated learning technique," Computers in Biology and Medicine, vol. 150, p. 106019, 2022. https://doi.org/10.1016/j.compbiomed.2022.106019.
A. A. Khan, A. A. Laghari, M. A. Shaikh, V. V. Dootio, Estrela, and R. T. Lopes, "A blockchain security module for brain-computer interface (BCI) with multimedia life cycle framework (MLCF)," Neuroscience Informatics, vol. 2, no. 1, p. 100030, 2022. https://doi.org/10.1016/j.neuri.2021.100030.
A. Sanjaya, A. B. Setiawan, D. P. Pamungkas, I. N. Farida, and M. A. D. Widyadara, "Measuring meaning similarity using TF/IDF and term synonym ID," In 2023 6th International Conference on Information and Communications Technology (ICOIACT), pp. 206-211, 2023. https://doi.org/10.1109/ICOIACT59844.2023.10455894.
S. W. Lee, and K. B. Sim, "Design and hardware implementation of a simplified DAG-based blockchain and new AES-CBC algorithm forIoT security," Electronics, 2021, https://doi.org/10.3390/electronics10091127.
W. Jebbar, and M. Al-Zubaidie, "Transaction security and management of blockchain-based smart contracts in e-banking-employing microsegmentation and yellow saddle Goatfish," Mesopotamian Journal of CyberSecurity, 4(2), 1-19, 2024. https://doi.org/10.58496/MJCS/2024/005.
M. Wazid, P. Gope, "BACKM-EHA: A novel blockchain-enabled security solution for IoMT-based e-healthcare applications," ACM Transactions on Internet Technology, 23(3), 1-28, 2023. https://doi.org/10.1145/3511898.
M. A. ALGHAMDI, "A fine-grained system driven of attacks over several new representation techniques Using Machine Learning,” IEEE Access, pp. 96615 – 96625, 2023. https://doi.org/10.1109/ACCESS.2023.3307018.
M. HIJJI, and G. ALAM, "A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: challenges and prospective solutions," IEEE Access, pp. 7152 - 7169, 2021. https://doi.org/10.1109/ACCESS.2020.3048839
C. A. Headland, "Mitigating cyber espionage: A network security strategy using notifications," Akron edu,2024.
A. AL-Hawamleh, "Cyber resilience framework: Strengthening defenses and enhancing continuity in business security," International Journal of Computing and Digital Systems, 15(1), pp. 1315-1331, 2024. http://dx.doi.org/10.12785/ijcds/150193.
G. C. C. F.Pereira, R. C. A. Alves, F. L. da Silva, R. M. Azevedo, B. C.Albertini, and C. B. Margi, "Performance evaluation of cryptographic algorithms over IoT platforms and operating systems," Security and Communication Networks, 2017(1), 2046735, 2017, https://doi.org/10.1155/2017/2046735.
S. Albitar, S. Fournier, and B. Espinasse, "An effective TF/IDF-based text-to-text semantic similarity measure for text classification," In Web Information Systems Engineering–WISE 2014: 15th International Conference, Thessaloniki, Greece, October 12-14, 2014, Proceedings, Part I 15 (pp. 105-114), Springer International Publishing. https://doi.org/10.1007/978-3-319-11749-2_8.
M. A. Khalaf, A. Steiti, "Artificial Intelligence Predictions in Cyber Security: Analysis and Early Detection of Cyber Attacks," Babylonian Journal of Machine Learning, Vol.2024, pp. 63–68DOI: https://doi.org/10.58496.
R. H. K. Al-Rubaye, A. K. TÜRKBEN," Using Artificial Intelligence to Evaluating Detection of Cybersecurity Threats in Ad Hoc Networks," Babylonian Journal of Networking, Vol.2024, pp. 45–56, https://doi.org/10.58496/BJN/2024/006.