Next-Generation Healthcare Management: AI and Blockchain Integration
Abstract
Many distant patients now use smart wearable devices on their bodies to ensure dependable therapy; as a result, the healthcare sector is now far more effective; however, it is impacted by data security breaches, which were a major worry because of the astounding increase in patient volume. The privacy of medical records is at risk when hackers intercept data over the channel, alter the data, and interfere with the system. Approaches to diagnosis and treatment have improved since the advent of the 40 medical industries to provide precise and prompt therapy. Medical professionals or specialists consult digital data on the patient’s condition; however, frequent vulnerable assaults against wearable technology include spoofing, manipulation, and hijacking. Providing the concerned medical professional with tampered data could endanger the patient’s life. Information from patient’s wearable devices is stored on blockchain because of its immutable, decentralized network transparency and security. Artificial intelligence can be used to detect the legitimacy of wearable device data entering the blockchain by utilizing a machine-learned classifier. This study presents a highly secure and reliable framework based on air and blockchain technology to remove fraudulent samples and permit legitimate information to circulate throughout the network for patients to follow and medical professionals to evaluate. By picking important characteristics among 43 attributes, the dataset samples from the imbalanced west hems 2020 dataset that are being evaluated are processed effectively. The lower-class attack samples were expanded to balance the dataset; sums were utilized to normalize and decrease the dimension by SVM. And classification of the experiments revealed that the malicious samples could be differentiated from the normal samples with an accuracy of over 98%, outperforming other recent rival studies.
Downloads
Metrics
References
Tanwar, S., Vora, J., Kaneriya, S., Tyagi, S., Kumar, N., Sharma, V., & You, I. (2020). Human arthritis analysis in fog computing environment using Bayesian network classifier and thread protocol. IEEE Consumer Electronics Magazine, 9, 88–94. https://doi.org/10.1109/CCEM.2020.9101655
Patel, K., Mehta, D., Mistry, C., Gupta, R., Tanwar, S., Kumar, N., & Alazab, M. (2020). Facial sentiment analysis using AI techniques: State-of-the-art, taxonomies, and challenges. IEEE Access, 8, 90495–90519. https://doi.org/10.1109/ACCESS.2020.2994421
Medifind. (2022, December 10). 8 Major Problems with the U.S. Healthcare System Today. https://www.medifind.com/news/post/problemsus-healthcare-system
Giliyar, A. (2022, December 22). Evolution of health data storage for digital healthcare. LinkedIn. https://www.linkedin.com/pulse/evolution-healthdata-storage-digital-healthcare-ambarish-giliyar/
Anand, P., Singh, Y., Selwal, A., Alazab, M., Tanwar, S., & Kumar, N. (2020). IoT vulnerability assessment for sustainable computing: Threats, current solutions, and open challenges. IEEE Access, 8, 168825–168853. https://doi.org/10.1109/ACCESS.2020.3026810
Noura, M. (2019). Efficient and secure cryptographic solutions for medical data (Doctoral dissertation). Université Bourgogne, Dijon, France.
Kester, Q. A., Nana, L., Pascu, A. C., Gire, S., & Eghan, J. M. (2015). A cryptographic technique for security of medical images in health information systems. Procedia Computer Science, 58, 538–543. https://doi.org/10.1016/j.procs.2015.08.084
Liu, X., Zhu, H., Lu, R., & Li, H. (2018). Efficient privacy-preserving online medical primary diagnosis scheme on naive Bayesian classification. Peer-to-Peer Networking and Applications, 11, 334–347. https://doi.org/10.1007/s12083-017-0591-9
Rai, A., & Singh, H. (2017). SVM based robust watermarking for enhanced medical image security. Multimedia Tools and Applications, 76, 18605–18618. https://doi.org/10.1007/s11042-016-4136-9
Gupta, R., Shukla, A., & Tanwar, S. (2020). AaYusH: A smart contract-based telesurgery system for healthcare 4.0. In 2020 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 1–6). Dublin, Ireland. https://doi.org/10.1109/ICCWorkshops49005.2020.9145274
Singh, R., Tanwar, S., & Sharma, T. P. (2020). Utilization of blockchain for mitigating the distributed denial of service attacks. Security and Privacy, 3, e96. https://doi.org/10.1002/spy2.96
Lee, T. F., Chang, I. P., & Kung, T. S. (2021). Blockchain-based healthcare information preservation using extended chaotic maps for HIPAA privacy/security regulations. Applied Sciences, 11, 10576. https://doi.org/10.3390/app111110576
Zhu, P., Hu, J., Zhang, Y., & Li, X. (2020). A blockchain-based solution for medication anti-counterfeiting and traceability. IEEE Access, 8, 184256–184272. https://doi.org/10.1109/ACCESS.2020.3031423
Tauqeer, H., Iqbal, M. M., Ali, A., Zaman, S., & Chaudhry, M. U. (2022). Cyberattacks detection in IoMT using machine learning techniques. Journal of Computer and Biomedical Informatics, 4, 13–20. https://doi.org/10.2139/ssrn.3901239
Lu, W. (2023). Detecting malicious attacks using principal component analysis in medical cyber-physical systems. In Artificial Intelligence for Cyber-Physical Systems Hardening (pp. 203–215). Springer. https://doi.org/10.1007/978-3-030-91607-6_12
Yeh, K. H. (2016). A secure IoT-based healthcare system with body sensor networks. IEEE Access, 4, 10288–10299. https://doi.org/10.1109/ACCESS.2016.2638038
Wu, F., Li, X., Sangaiah, A. K., Xu, L., Kumari, S., Wu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727–737. https://doi.org/10.1016/j.future.2017.10.003
Banerjee, S., Odelu, V., Das, A. K., Chattopadhyay, S., Kumar, N., Park, Y., & Tanwar, S. (2018). Design of an anonymity-preserving group formation based authentication protocol in global mobility networks. IEEE Access, 6, 20673–20693. https://doi.org/10.1109/ACCESS.2018.2816807
Yanambaka, V. P., Mohanty, S. P., Kougianos, E., & Puthal, D. (2019). PMsec: Physical unclonable function-based robust and lightweight authentication in the internet of medical things. IEEE Transactions on Consumer Electronics, 65, 388–397. https://doi.org/10.1109/TCE.2019.2907581
Zhu, H., Liu, X., Lu, R., & Li, H. (2017). Efficient and privacy-preserving online medical prediagnosis framework using nonlinear SVM. IEEE Journal of Biomedical and Health Informatics, 21, 838–850. https://doi.org/10.1109/JBHI.2016.2633960
Newaz, A. K. M. I., Sikder, A. K., Rahman, M. A., & Uluagac, A. S. (2019). HealthGuard: A machine learning-based security framework for smart healthcare systems. arXiv. https://arxiv.org/abs/1909.10565
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Girish Ghormode, Soni A. Chaturvedi, A. A. Khurshid, J.P. Rothe

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.