Blockchain Assisted Intrusion Detection and Data Classification on Smart Healthcare Management System

Blockchain Assisted Intrusion Detection and Data Classification on Smart Healthcare Management System

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-2
Year of Publication : 2023
Author : K. Rajeshkumar, C. Ananth, N. Mohananthini
DOI : 10.14445/22315381/IJETT-V71I2P202

How to Cite?

K. Rajeshkumar, C. Ananth, N. Mohananthini, "Blockchain Assisted Intrusion Detection and Data Classification on Smart Healthcare Management System," International Journal of Engineering Trends and Technology, vol. 71, no. 2, pp. 9-20, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I2P202

Abstract
Blockchain (BC) is a newer technology being applied for making creative solutions in different fields involving healthcare. A Blockchain network is used in the medical field for preserving and exchanging patient datasets through diagnostic laboratories, hospitals, physicians, and pharmaceutical firms. BC application could precisely classify severe and dangerous mistakes in the healthcare sector. Accordingly, it could enhance the transparency, performance, and security of sharing healthcare datasets in the medical system. This technique is useful to healthcare institutions to gain insight and improve the analysis of healthcare records. Therefore, this study focuses on the design of healthcare solutions with BC technology to accomplish security. This study presents a Blockchain Assisted Intrusion Detection and Data Classification on Smart Healthcare Management System (BAIDDC-SHMS). The presented BAIDDC-SHMS technique initially performs intrusion detection using spiral search optimization (SPO) with a deep stacked sparse autoencoder (DSSAE) model. Besides, the BAIDDC-SHMS model involves EfficientNet feature extraction with a softmax (SM) classifier for the medical image classification process. The SPO algorithm was utilized for optimal modification of the hyperparameters of the DSSAE method and thereby raised the intrusion detection efficacy of the DSSAE algorithm. To demonstrate the betterment of the BAIDDCSHMS model, a wide range of experimental analyses can be conducted, and the outcomes are inspected under different measures. The comprehensive comparison study emphasized the superior performance of the BAIDDC-SHMS algorithm over other approaches.

Keywords
Blockchain, Security, Healthcare management, Deep learning, Intrusion detection, Privacy.

References
[1] Mohan Krishna, and Amit Kumar Tyagi, “Intrusion Detection in Intelligent Transportation System and Its Applications Using Blockchain Technology,” 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), IEEE, pp. 18, 2020. Crossref, https://doi.org/10.1109/ic-ETITE47903.2020.332
[2] Ananth, C., Karthikeyan, M., and Mohananthini. N, “A Secured Healthcare System Using Private Blockchain Technology,” Journal of Engineering Technology, vol. 6, no. 2, pp. 42-54.
[3] Sujith Samuel Mathew et al., “Integration of Blockchain and Collaborative Intrusion Detection for Secure Data Transactions in Industrial IoT: A Survey,” Cluster Computing, vol. 25, pp. 4129-4149, 2022. Crossref, https://doi.org/10.1007/s10586-022-03645-9
[4] Mohammad Dawood Momand, Dr Vikas Thada, and Mr. Utpal Shrivastava, "Intrusion Detection System in IoT Network," SSRG International Journal of Computer Science and Engineering , vol. 7, no. 4, pp. 11-15, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I4P104
[5] Mohananthini, N, Ananth, C, and Parvees, M.Y. Mohamed, “Secured Different Disciplinaries in Electronic Medical Record Based on Watermarking and Consortium Blockchain Technology,” KSII Transactions on Internet and Information Systems (TIIS), vol. 16, no. 3, pp. 947-971, 2022. Crossref, https://doi.org/10.3837/tiis.2022.03.011
[6] Osama Alkadi, Nour Moustafa, and Benjamin Turnbull, “A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions,” IEEE Access, vol. 8, pp.104893-104917, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.2999715
[7] Wenjuan Li et al., “Toward a Blockchain-Based Framework for Challenge-Based Collaborative Intrusion Detection,” International Journal of Information Security, vol. 20, pp. 127-139, 2021. Crossref, https://doi.org/10.1007/s10207-020-00488-6
[8] Javaria Amin et al., “A Secure Two-Qubit Quantum Model for Segmentation and Classification of Brain Tumor Using MRI Images Based on Blockchain,” Neural Computing and Applications, vol. 34, pp. 17315–17328, 2022.
[9] Shuangquan Li et al., “Health Checkup Could Reveal Chronic Disorders with Support from Artificial Intelligence,” International Journal of Engineering Trends and Technology, vol. 67, no. 11, pp. 8-15, 2019. Crossref, https://doi.org/10.14445/22315381/IJETTV67I11P202
[10] Dilmurod Nabiev, and Khayit Turaev, "Study of Synthesis and Pigment Characteristics of the Composition of Copper Phthalocyanine with Terephthalic Acid," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 1-9, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I8P201
[11] Shwetambari Borade et al., "Deep Scattering Convolutional Network for Cosmetic Skin Classification," International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 10-23, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I7P202
[12] Gia Nhu Nguyen, “Secure Blockchain Enabled Cyber–Physical Systems in Healthcare Using Deep Belief Network with Resnet Model,” Journal of Parallel and Distributed Computing, vol. 153, pp.150-160, 2021. Crossref, https://doi.org/10.1016/j.jpdc.2021.03.011
[13] Osama Alkadi, Nour Moustafa, and Benjamin Turnbull, “A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks,” Proceedings of SAI Intelligent Systems Conference, vol. 1250, pp. 553-565, 2020. https://doi.org/10.1007/978-3-030-55180-3_41
[14] K. L. Neela, and V. Kavitha, “Blockchain Based Chaotic Deep GAN Encryption Scheme for Securing Medical Images in a Cloud Environment,” Applied Intelligence, vol. 53, pp. 4733–4747, 2023. Crossref, https://doi.org/10.1007/s10489-022-03730-x
[15] Xiaowei Wang et al., “A Network Intrusion Detection Method Based on Deep Multi-Scale Convolutional Neural Network,” International Journal of Wireless Information Networks, vol. 27, no. 4, pp.503-517, 2020. Crossref, https://doi.org/10.1007/s10776-020-00495-3
[16] N.K. Al-Shammari, T. H. Syed, and M.B. Syed, “An Edge–IoT Framework and Prototype Based on Blockchain for Smart Healthcare Applications,” Engineering, Technology & Applied Science Research, vol. 11, no. 4, pp.7326-7331, 2021. Crossref, https://doi.org/10.48084/etasr.4245
[17] Ahmad Firdaus, “Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management,” Journal of Medical Systems, vol. 42, no. 6, pp.1-23, 2018. Crossref, https://doi.org/10.1007/s10916-018-0966-x
[18] Padmavathi Udayakumar, and Narendran Rajagopalan, “Blockchain Enabled Secure Image Transmission and Diagnosis Scheme in Medical Cyber-Physical Systems,” Journal of Electronic Imaging, vol. 31, no. 6, p. 062002. Crossref, https://doi.org/10.1117/1.JEI.31.6.062002
[19] Funlade T. Sunmola, “Context-Aware Blockchain-Based Sustainable Supply Chain Visibility Management,” Procedia Computer Science, vol. 180, pp.887-892, 2021. Crossref, https://doi.org/10.1016/j.procs.2021.01.339
[20] Yu-Dong Zhang et al., “Pseudo Zernike Moment and Deep Stacked Sparse Autoencoder for COVID-19 Diagnosis,” CMC-Computers Materials & Continua, vol. 69, no. 3, pp. 3145-3162, 2021. Crossref, https://doi.org/10.32604/cmc.2021.018040
[21] A. Kaveh, and S. Mahjoubi, “Hypotrochoid Spiral Optimization Approach for Sizing and Layout Optimization of Truss Structures with Multiple Frequency Constraints,” Engineering with Computers, vol. 35, pp.1443-1462, 2019. Crossref, https://doi.org/10.1007/s00366- 018-0675-6
[22] Ümit Atila, “Plant Leaf Disease Classification Using Efficientnet Deep Learning Model,” Ecological Informatics, vol. 61, p.101182, 2021. Crossref, https://doi.org/10.1016/j.ecoinf.2020.101182
[23] Jinping Liu et al., “Toward Robust Fault Identification of Complex Industrial Processes Using Stacked Sparse-Denoising Autoencoder with Softmax Classifier,” IEEE Transactions on Cybernetic, vol. 53, no. 1, pp. 428-442, 2023. Crossref, https://doi.org/10.1109/TCYB.2021.3109618
[24] [Online]. Available: https://www.kaggle.com/hassan06/nslkdd
[25] [Online]. Available: https://challenge.isic-archive.com/data/