Next-Generation Healthcare Management: AI and Blockchain Integration

Authors

  • Girish Ghormode
  • Soni A. Chaturvedi
  • A. A. Khurshid
  • J.P. Rothe

Abstract

Many distant patients now use smart wearable devices on their bodies to ensure dependable therapy; as a result, the healthcare sector is now far more effective; however, it is impacted by data security breaches, which were a major worry because of the astounding increase in patient volume. The privacy of medical records is at risk when hackers intercept data over the channel, alter the data, and interfere with the system. Approaches to diagnosis and treatment have improved since the advent of the 40 medical industries to provide precise and prompt therapy. Medical professionals or specialists consult digital data on the patient’s condition; however, frequent vulnerable assaults against wearable technology include spoofing, manipulation, and hijacking. Providing the concerned medical professional with tampered data could endanger the patient’s life. Information from patient’s wearable devices is stored on blockchain because of its immutable, decentralized network transparency and security. Artificial intelligence can be used to detect the legitimacy of wearable device data entering the blockchain by utilizing a machine-learned classifier. This study presents a highly secure and reliable framework based on air and blockchain technology to remove fraudulent samples and permit legitimate information to circulate throughout the network for patients to follow and medical professionals to evaluate. By picking important characteristics among 43 attributes, the dataset samples from the imbalanced west hems 2020 dataset that are being evaluated are processed effectively. The lower-class attack samples were expanded to balance the dataset; sums were utilized to normalize and decrease the dimension by SVM. And classification of the experiments revealed that the malicious samples could be differentiated from the normal samples with an accuracy of over 98%, outperforming other recent rival studies.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Tanwar, S., Vora, J., Kaneriya, S., Tyagi, S., Kumar, N., Sharma, V., & You, I. (2020). Human arthritis analysis in fog computing environment using Bayesian network classifier and thread protocol. IEEE Consumer Electronics Magazine, 9, 88–94. https://doi.org/10.1109/CCEM.2020.9101655

Patel, K., Mehta, D., Mistry, C., Gupta, R., Tanwar, S., Kumar, N., & Alazab, M. (2020). Facial sentiment analysis using AI techniques: State-of-the-art, taxonomies, and challenges. IEEE Access, 8, 90495–90519. https://doi.org/10.1109/ACCESS.2020.2994421

Medifind. (2022, December 10). 8 Major Problems with the U.S. Healthcare System Today. https://www.medifind.com/news/post/problemsus-healthcare-system

Giliyar, A. (2022, December 22). Evolution of health data storage for digital healthcare. LinkedIn. https://www.linkedin.com/pulse/evolution-healthdata-storage-digital-healthcare-ambarish-giliyar/

Anand, P., Singh, Y., Selwal, A., Alazab, M., Tanwar, S., & Kumar, N. (2020). IoT vulnerability assessment for sustainable computing: Threats, current solutions, and open challenges. IEEE Access, 8, 168825–168853. https://doi.org/10.1109/ACCESS.2020.3026810

Noura, M. (2019). Efficient and secure cryptographic solutions for medical data (Doctoral dissertation). Université Bourgogne, Dijon, France.

Kester, Q. A., Nana, L., Pascu, A. C., Gire, S., & Eghan, J. M. (2015). A cryptographic technique for security of medical images in health information systems. Procedia Computer Science, 58, 538–543. https://doi.org/10.1016/j.procs.2015.08.084

Liu, X., Zhu, H., Lu, R., & Li, H. (2018). Efficient privacy-preserving online medical primary diagnosis scheme on naive Bayesian classification. Peer-to-Peer Networking and Applications, 11, 334–347. https://doi.org/10.1007/s12083-017-0591-9

Rai, A., & Singh, H. (2017). SVM based robust watermarking for enhanced medical image security. Multimedia Tools and Applications, 76, 18605–18618. https://doi.org/10.1007/s11042-016-4136-9

Gupta, R., Shukla, A., & Tanwar, S. (2020). AaYusH: A smart contract-based telesurgery system for healthcare 4.0. In 2020 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 1–6). Dublin, Ireland. https://doi.org/10.1109/ICCWorkshops49005.2020.9145274

Singh, R., Tanwar, S., & Sharma, T. P. (2020). Utilization of blockchain for mitigating the distributed denial of service attacks. Security and Privacy, 3, e96. https://doi.org/10.1002/spy2.96

Lee, T. F., Chang, I. P., & Kung, T. S. (2021). Blockchain-based healthcare information preservation using extended chaotic maps for HIPAA privacy/security regulations. Applied Sciences, 11, 10576. https://doi.org/10.3390/app111110576

Zhu, P., Hu, J., Zhang, Y., & Li, X. (2020). A blockchain-based solution for medication anti-counterfeiting and traceability. IEEE Access, 8, 184256–184272. https://doi.org/10.1109/ACCESS.2020.3031423

Tauqeer, H., Iqbal, M. M., Ali, A., Zaman, S., & Chaudhry, M. U. (2022). Cyberattacks detection in IoMT using machine learning techniques. Journal of Computer and Biomedical Informatics, 4, 13–20. https://doi.org/10.2139/ssrn.3901239

Lu, W. (2023). Detecting malicious attacks using principal component analysis in medical cyber-physical systems. In Artificial Intelligence for Cyber-Physical Systems Hardening (pp. 203–215). Springer. https://doi.org/10.1007/978-3-030-91607-6_12

Yeh, K. H. (2016). A secure IoT-based healthcare system with body sensor networks. IEEE Access, 4, 10288–10299. https://doi.org/10.1109/ACCESS.2016.2638038

Wu, F., Li, X., Sangaiah, A. K., Xu, L., Kumari, S., Wu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727–737. https://doi.org/10.1016/j.future.2017.10.003

Banerjee, S., Odelu, V., Das, A. K., Chattopadhyay, S., Kumar, N., Park, Y., & Tanwar, S. (2018). Design of an anonymity-preserving group formation based authentication protocol in global mobility networks. IEEE Access, 6, 20673–20693. https://doi.org/10.1109/ACCESS.2018.2816807

Yanambaka, V. P., Mohanty, S. P., Kougianos, E., & Puthal, D. (2019). PMsec: Physical unclonable function-based robust and lightweight authentication in the internet of medical things. IEEE Transactions on Consumer Electronics, 65, 388–397. https://doi.org/10.1109/TCE.2019.2907581

Zhu, H., Liu, X., Lu, R., & Li, H. (2017). Efficient and privacy-preserving online medical prediagnosis framework using nonlinear SVM. IEEE Journal of Biomedical and Health Informatics, 21, 838–850. https://doi.org/10.1109/JBHI.2016.2633960

Newaz, A. K. M. I., Sikder, A. K., Rahman, M. A., & Uluagac, A. S. (2019). HealthGuard: A machine learning-based security framework for smart healthcare systems. arXiv. https://arxiv.org/abs/1909.10565

Downloads

Published

2025-04-29

How to Cite

1.
Ghormode G, Chaturvedi SA, Khurshid AA, Rothe J. Next-Generation Healthcare Management: AI and Blockchain Integration. J Neonatal Surg [Internet]. 2025Apr.29 [cited 2025Oct.3];14(19S). Available from: https://www.jneonatalsurg.com/index.php/jns/article/view/3583