Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Volume 16 , Issue 1 , PP: 152-170, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Personal Data Protection Model in IOMT-Blockchain on Secured Bit-Count Transmutation Data Encryption Approach

Sultan Almotairi 1 * , Santosh Reddy Addula 2 , Olayan Alharbi 3 , Zaid Alzaid 4 , Yasser M. Hausawi 5 , Jaber Almutairi 6

  • 1 Department of Computer Science, College of Computer and Information Sciences, Majmaah University, Majmaah, 11952, Saudi Arabia - (almotairi@mu.edu.sa)
  • 2 Department of Information Technology, University of the Cumberlands, Williamsburg, KY, USA - (santoshaddulait@gmail.com)
  • 3 Department of Information Systems, College of Computer and Information Sciences, Majmaah University, Majmaah, 11952, Saudi Arabia - (o.alharbi@mu.edu.sa)
  • 4 Department of Computer Science, Faculty of Computer and Information Systems, Islamic University of Madinah, Medinah, 42351, Saudi Arabia - (zsalzaid@iu.edu.sa)
  • 5 IT Programs Center, Faculty of IT Department, Institute of Public Administration, Riyadh, 11141, Saudi Arabia - (Hawsawiy@ipa.edu.sa)
  • 6 Department of Computer Science, College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia - (jalmutairi@taibahu.edu.sa)
  • Doi: https://doi.org/10.54216/FPA.160111

    Received: July 18, 2023 Revised: November 05, 2023 Accepted: April 28, 2024
    Abstract

    The Internet of Medical Things (IoMT) has paved the way for innovative approaches to collecting and managing medical data. With the large and sensitive medical data being processed hence, the need for a strong identity and privacy become necessary. The present paper suggests a comprehensive method of PriMedGuard which aims at protection of the personal medical information. The first stage will be data collection from devices and sensors, then data cleaning to transform the data into the required format. There is also a safety system in the system that registers and authenticates authorized entities as well as ETDO (Enhanced Tasmanian Devil Optimization algorithm) is used for generating asymmetric cryptographic keys. The data is encrypted using the Secure Bit-Count Transmutation (SBCT) Data Encryption Algorithm and then put in the locations provided by the InterPlanetary File System (IPFS), a decentralized and distributed storage system. A safe smart contract on the blockchain is created so that the data retrieval is secure and MedSecEnsemble Detection is proposed as an intrusion detection technique in the IoMT network. By using this method, data will stay available while at the same time integrity, confidentiality and protection against vulnerabilities are ensured. Hence, the Internet of Medical Things ecosystem will be secured from unauthorized access and possible security threats…

    Keywords :

    Medical data analysis , Cryptography , Encryption system , Internet of Things , Ensemble Model , Blockchain technology

    References

     

    [1]    Kumar P, Kumar R, Srivastava G, Gupta GP, Tripathi R, Gadekallu TR, Xiong NN. PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Transactions on Network Science and Engineering. 2021 Jun 16;8(3):2326-41.

    [2]    Elhoseny M, Haseeb K, Shah AA, Ahmad I, Jan Z, Alghamdi MI. IoT solution for AI-enabled PRIVACY-PREServing with big data transferring: an application for healthcare using blockchain. Energies. 2021 Aug 28;14(17):5364.

    [3]    Kumar R, Wang W, Kumar J, Yang T, Khan A, Ali W, Ali I. An integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals. Computerized Medical Imaging and Graphics. 2021 Jan 1; 87:101812.

    [4]    Haddad A, Habaebi MH, Islam MR, Hasbullah NF, Zabidi SA. Systematic review on ai-blockchain based e-healthcare records management systems. IEEE Access. 2022 Aug 26; 10:94583-615.

    [5]    Sivan R, Zukarnain ZA. Security and privacy in cloud-based e-health system. Symmetry. 2021 Apr 23;13(5):742.

    [6]    Pise AA, Almuzaini KK, Ahanger TA, Farouk A, Pareek PK, Nuagah SJ. Enabling artificial intelligence of things (AIoT) healthcare architectures and listing security issues. Computational Intelligence and Neuroscience. 2022 Aug 3;2022.

    [7]    Thapa C, Camtepe S. Precision health data: Requirements, challenges and existing techniques for data security and privacy. Computers in biology and medicine. 2021 Feb 1; 129:104130.

    [8]    Garg N, Petwal R, Wazid M, Singh DP, Das AK, Rodrigues JJ. On the design of an AI-driven secure communication scheme for Internet of medical things environment. Digital Communications and Networks. 2023 Oct 1;9(5):1080-9.

    [9]    Ramasamy LK, Khan F, Shah M, Prasad BV, Iwendi C, Biamba C. Secure smart wearable computing through artificial intelligence-enabled internet of things and cyber-physical systems for health monitoring. Sensors. 2022 Jan 29;22(3):1076.

    [10] Liu Y, Yu J, Fan J, Vijayakumar P, Chang V. Achieving privacy-preserving DSSE for intelligent IoT healthcare system. IEEE Transactions on Industrial Informatics. 2021 Jul 30;18(3):2010-20.

    [11] Lo'ai AT, Saldamli G. Reconsidering big data security and privacy in cloud and mobile cloud systems. Journal of King Saud University-Computer and Information Sciences. 2021 Sep 1;33(7):810-9.

    [12] Ali A, Rahim HA, Pasha MF, Dowsley R, Masud M, Ali J, Baz M. Security, privacy, and reliability in digital healthcare systems using blockchain. Electronics. 2021 Aug 23;10(16):2034.

    [13] Rahman A, Hossain MS, Muhammad G, Kundu D, Debnath T, Rahman M, Khan MS, Tiwari P, Band SS. Federated learning-based AI approaches in smart healthcare: concepts, taxonomies, challenges and open issues. Cluster computing. 2023 Aug;26(4):2271-311.

    [14] Rehman A, Saba T, Haseeb K, Larabi Marie-Sainte S, Lloret J. Energy-efficient IoT e-health using artificial intelligence model with homomorphic secret sharing. Energies. 2021 Oct 7;14(19):6414.

    [15] Andreas A, Mavromoustakis CX, Mastorakis G, Do DT, Batalla JM, Pallis E, Markakis EK. Towards an optimized security approach to IoT devices with confidential healthcare data exchange. Multimedia Tools and Applications. 2021 Aug; 80:31435-49.

    [16] Mahajan HB, Rashid AS, Junnarkar AA, Uke N, Deshpande SD, Futane PR, Alkhayyat A, Alhayani B. Integration of Healthcare 4.0 and blockchain into secure cloud-based electronic health records systems. Applied Nanoscience. 2023 Mar;13(3):2329-42.

    [17] Ali A, Pasha MF, Ali J, Fang OH, Masud M, Jurcut AD, Alzain MA. Deep learning based homomorphic secure search-able encryption for keyword search in blockchain healthcare system: A novel approach to cryptography. Sensors. 2022 Jan 11;22(2):528.

    [18] Sundas A, Badotra S, Bharany S, Almogren A, Tag-ElDin EM, Rehman AU. HealthGuard: An Intelligent Healthcare System Security Framework Based on Machine Learning. Sustainability. 2022 Sep 22;14(19):11934.

    [19] Mohanty MD, Das A, Mohanty MN, Altameem A, Nayak SR, Saudagar AK, Poonia RC. Design of Smart and Secured Healthcare Service Using Deep Learning with Modified SHA-256 Algorithm. InHealthcare 2022 Jul 9 (Vol. 10, No. 7, p. 1275). MDPI.

    [20] Kumar P, Kumar R, Gupta GP, Tripathi R, Jolfaei A, Islam AN. A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system. Journal of Parallel and Distributed Computing. 2023 Feb 1; 172:69-83.

    [21] Almalawi A, Khan AI, Alsolami F, Abushark YB, Alfakeeh AS. Managing Security of Healthcare Data for a Modern Healthcare System. Sensors. 2023 Mar 30;23(7):3612.

    [22] Ghazal TM, Hasan MK, Abdullah SN, Bakar KA, Al Hamadi H. Private blockchain-based encryption framework using computational intelligence approach. Egyptian Informatics Journal. 2022 Dec 1;23(4):69-75.

    [23] Ali A, Almaiah MA, Hajjej F, Pasha MF, Fang OH, Khan R, Teo J, Zakarya M. An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors. 2022 Jan 12;22(2):572.

    [24] Hernández-Álvarez, L., de Fuentes, J. M., González-Manzano, L., & Hernández Encinas, L. (2020). Privacy-preserving sensor-based continuous authentication and user profiling: a review. Sensors, 21(1), 92.

    Cite This Article As :
    Almotairi, Sultan. , Reddy, Santosh. , Alharbi, Olayan. , Alzaid, Zaid. , M., Yasser. , Almutairi, Jaber. Personal Data Protection Model in IOMT-Blockchain on Secured Bit-Count Transmutation Data Encryption Approach. Fusion: Practice and Applications, vol. , no. , 2024, pp. 152-170. DOI: https://doi.org/10.54216/FPA.160111
    Almotairi, S. Reddy, S. Alharbi, O. Alzaid, Z. M., Y. Almutairi, J. (2024). Personal Data Protection Model in IOMT-Blockchain on Secured Bit-Count Transmutation Data Encryption Approach. Fusion: Practice and Applications, (), 152-170. DOI: https://doi.org/10.54216/FPA.160111
    Almotairi, Sultan. Reddy, Santosh. Alharbi, Olayan. Alzaid, Zaid. M., Yasser. Almutairi, Jaber. Personal Data Protection Model in IOMT-Blockchain on Secured Bit-Count Transmutation Data Encryption Approach. Fusion: Practice and Applications , no. (2024): 152-170. DOI: https://doi.org/10.54216/FPA.160111
    Almotairi, S. , Reddy, S. , Alharbi, O. , Alzaid, Z. , M., Y. , Almutairi, J. (2024) . Personal Data Protection Model in IOMT-Blockchain on Secured Bit-Count Transmutation Data Encryption Approach. Fusion: Practice and Applications , () , 152-170 . DOI: https://doi.org/10.54216/FPA.160111
    Almotairi S. , Reddy S. , Alharbi O. , Alzaid Z. , M. Y. , Almutairi J. [2024]. Personal Data Protection Model in IOMT-Blockchain on Secured Bit-Count Transmutation Data Encryption Approach. Fusion: Practice and Applications. (): 152-170. DOI: https://doi.org/10.54216/FPA.160111
    Almotairi, S. Reddy, S. Alharbi, O. Alzaid, Z. M., Y. Almutairi, J. "Personal Data Protection Model in IOMT-Blockchain on Secured Bit-Count Transmutation Data Encryption Approach," Fusion: Practice and Applications, vol. , no. , pp. 152-170, 2024. DOI: https://doi.org/10.54216/FPA.160111