Blockchain Assisted Intrusion Detection and Data Classification on Smart Healthcare Management System
Blockchain Assisted Intrusion Detection and Data Classification on Smart Healthcare Management System |
||
|
||
© 2023 by IJETT Journal | ||
Volume-71 Issue-2 |
||
Year of Publication : 2023 | ||
Author : K. Rajeshkumar, C. Ananth, N. Mohananthini |
||
DOI : 10.14445/22315381/IJETT-V71I2P202 |
How to Cite?
K. Rajeshkumar, C. Ananth, N. Mohananthini, "Blockchain Assisted Intrusion Detection and Data Classification on Smart Healthcare Management System," International Journal of Engineering Trends and Technology, vol. 71, no. 2, pp. 9-20, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I2P202
Abstract
Blockchain (BC) is a newer technology being applied for making creative solutions in different fields involving
healthcare. A Blockchain network is used in the medical field for preserving and exchanging patient datasets through
diagnostic laboratories, hospitals, physicians, and pharmaceutical firms. BC application could precisely classify severe and
dangerous mistakes in the healthcare sector. Accordingly, it could enhance the transparency, performance, and security of
sharing healthcare datasets in the medical system. This technique is useful to healthcare institutions to gain insight and
improve the analysis of healthcare records. Therefore, this study focuses on the design of healthcare solutions with BC
technology to accomplish security. This study presents a Blockchain Assisted Intrusion Detection and Data Classification on
Smart Healthcare Management System (BAIDDC-SHMS). The presented BAIDDC-SHMS technique initially performs
intrusion detection using spiral search optimization (SPO) with a deep stacked sparse autoencoder (DSSAE) model. Besides,
the BAIDDC-SHMS model involves EfficientNet feature extraction with a softmax (SM) classifier for the medical image
classification process. The SPO algorithm was utilized for optimal modification of the hyperparameters of the DSSAE method
and thereby raised the intrusion detection efficacy of the DSSAE algorithm. To demonstrate the betterment of the BAIDDCSHMS model, a wide range of experimental analyses can be conducted, and the outcomes are inspected under different
measures. The comprehensive comparison study emphasized the superior performance of the BAIDDC-SHMS algorithm over
other approaches.
Keywords
Blockchain, Security, Healthcare management, Deep learning, Intrusion detection, Privacy.
References
[1] Mohan Krishna, and Amit Kumar Tyagi, “Intrusion Detection in Intelligent Transportation System and Its Applications Using
Blockchain Technology,” 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE),
IEEE, pp. 18, 2020. Crossref, https://doi.org/10.1109/ic-ETITE47903.2020.332
[2] Ananth, C., Karthikeyan, M., and Mohananthini. N, “A Secured Healthcare System Using Private Blockchain Technology,” Journal of
Engineering Technology, vol. 6, no. 2, pp. 42-54.
[3] Sujith Samuel Mathew et al., “Integration of Blockchain and Collaborative Intrusion Detection for Secure Data Transactions in Industrial
IoT: A Survey,” Cluster Computing, vol. 25, pp. 4129-4149, 2022. Crossref, https://doi.org/10.1007/s10586-022-03645-9
[4] Mohammad Dawood Momand, Dr Vikas Thada, and Mr. Utpal Shrivastava, "Intrusion Detection System in IoT Network," SSRG
International Journal of Computer Science and Engineering , vol. 7, no. 4, pp. 11-15, 2020. Crossref,
https://doi.org/10.14445/23488387/IJCSE-V7I4P104
[5] Mohananthini, N, Ananth, C, and Parvees, M.Y. Mohamed, “Secured Different Disciplinaries in Electronic Medical Record Based on
Watermarking and Consortium Blockchain Technology,” KSII Transactions on Internet and Information Systems (TIIS), vol. 16, no. 3,
pp. 947-971, 2022. Crossref, https://doi.org/10.3837/tiis.2022.03.011
[6] Osama Alkadi, Nour Moustafa, and Benjamin Turnbull, “A Review of Intrusion Detection and Blockchain Applications in the Cloud:
Approaches, Challenges and Solutions,” IEEE Access, vol. 8, pp.104893-104917, 2020. Crossref,
https://doi.org/10.1109/ACCESS.2020.2999715
[7] Wenjuan Li et al., “Toward a Blockchain-Based Framework for Challenge-Based Collaborative Intrusion Detection,” International
Journal of Information Security, vol. 20, pp. 127-139, 2021. Crossref, https://doi.org/10.1007/s10207-020-00488-6
[8] Javaria Amin et al., “A Secure Two-Qubit Quantum Model for Segmentation and Classification of Brain Tumor Using MRI Images
Based on Blockchain,” Neural Computing and Applications, vol. 34, pp. 17315–17328, 2022.
[9] Shuangquan Li et al., “Health Checkup Could Reveal Chronic Disorders with Support from Artificial Intelligence,” International
Journal of Engineering Trends and Technology, vol. 67, no. 11, pp. 8-15, 2019. Crossref, https://doi.org/10.14445/22315381/IJETTV67I11P202
[10] Dilmurod Nabiev, and Khayit Turaev, "Study of Synthesis and Pigment Characteristics of the Composition of Copper Phthalocyanine
with Terephthalic Acid," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 1-9, 2022. Crossref,
https://doi.org/10.14445/22315381/IJETT-V70I8P201
[11] Shwetambari Borade et al., "Deep Scattering Convolutional Network for Cosmetic Skin Classification," International Journal of
Engineering Trends and Technology, vol. 70, no. 7, pp. 10-23, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I7P202
[12] Gia Nhu Nguyen, “Secure Blockchain Enabled Cyber–Physical Systems in Healthcare Using Deep Belief Network with Resnet
Model,” Journal of Parallel and Distributed Computing, vol. 153, pp.150-160, 2021. Crossref,
https://doi.org/10.1016/j.jpdc.2021.03.011
[13] Osama Alkadi, Nour Moustafa, and Benjamin Turnbull, “A Collaborative Intrusion Detection System Using Deep Blockchain
Framework for Securing Cloud Networks,” Proceedings of SAI Intelligent Systems Conference, vol. 1250, pp. 553-565, 2020.
https://doi.org/10.1007/978-3-030-55180-3_41
[14] K. L. Neela, and V. Kavitha, “Blockchain Based Chaotic Deep GAN Encryption Scheme for Securing Medical Images in a Cloud
Environment,” Applied Intelligence, vol. 53, pp. 4733–4747, 2023. Crossref, https://doi.org/10.1007/s10489-022-03730-x
[15] Xiaowei Wang et al., “A Network Intrusion Detection Method Based on Deep Multi-Scale Convolutional Neural
Network,” International Journal of Wireless Information Networks, vol. 27, no. 4, pp.503-517, 2020. Crossref,
https://doi.org/10.1007/s10776-020-00495-3
[16] N.K. Al-Shammari, T. H. Syed, and M.B. Syed, “An Edge–IoT Framework and Prototype Based on Blockchain for Smart Healthcare
Applications,” Engineering, Technology & Applied Science Research, vol. 11, no. 4, pp.7326-7331, 2021. Crossref,
https://doi.org/10.48084/etasr.4245
[17] Ahmad Firdaus, “Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data
Management,” Journal of Medical Systems, vol. 42, no. 6, pp.1-23, 2018. Crossref, https://doi.org/10.1007/s10916-018-0966-x
[18] Padmavathi Udayakumar, and Narendran Rajagopalan, “Blockchain Enabled Secure Image Transmission and Diagnosis Scheme in
Medical Cyber-Physical Systems,” Journal of Electronic Imaging, vol. 31, no. 6, p. 062002. Crossref,
https://doi.org/10.1117/1.JEI.31.6.062002
[19] Funlade T. Sunmola, “Context-Aware Blockchain-Based Sustainable Supply Chain Visibility Management,” Procedia Computer
Science, vol. 180, pp.887-892, 2021. Crossref, https://doi.org/10.1016/j.procs.2021.01.339
[20] Yu-Dong Zhang et al., “Pseudo Zernike Moment and Deep Stacked Sparse Autoencoder for COVID-19 Diagnosis,” CMC-Computers
Materials & Continua, vol. 69, no. 3, pp. 3145-3162, 2021. Crossref, https://doi.org/10.32604/cmc.2021.018040
[21] A. Kaveh, and S. Mahjoubi, “Hypotrochoid Spiral Optimization Approach for Sizing and Layout Optimization of Truss Structures with
Multiple Frequency Constraints,” Engineering with Computers, vol. 35, pp.1443-1462, 2019. Crossref, https://doi.org/10.1007/s00366-
018-0675-6
[22] Ümit Atila, “Plant Leaf Disease Classification Using Efficientnet Deep Learning Model,” Ecological Informatics, vol. 61, p.101182,
2021. Crossref, https://doi.org/10.1016/j.ecoinf.2020.101182
[23] Jinping Liu et al., “Toward Robust Fault Identification of Complex Industrial Processes Using Stacked Sparse-Denoising Autoencoder
with Softmax Classifier,” IEEE Transactions on Cybernetic, vol. 53, no. 1, pp. 428-442, 2023. Crossref,
https://doi.org/10.1109/TCYB.2021.3109618
[24] [Online]. Available: https://www.kaggle.com/hassan06/nslkdd
[25] [Online]. Available: https://challenge.isic-archive.com/data/