Enhancing Healthcare Data Security in IoT Environments Using Blockchain and DCGRU with Twofish Encryption

Journal Title: Information Dynamics and Applications - Year 2023, Vol 2, Issue 4

Abstract

In the rapidly evolving landscape of digital healthcare, the integration of cloud computing, Internet of Things (IoT), and advanced computational methodologies such as machine learning and artificial intelligence (AI) has significantly enhanced early disease detection, accessibility, and diagnostic scope. However, this progression has concurrently elevated concerns regarding the safeguarding of sensitive patient data. Addressing this challenge, a novel secure healthcare system employing a blockchain-based IoT framework, augmented by deep learning and biomimetic algorithms, is presented. The initial phase encompasses a blockchain-facilitated mechanism for secure data storage, authentication of users, and prognostication of health status. Subsequently, the modified Jellyfish Search Optimization (JSO) algorithm is employed for optimal feature selection from datasets. A unique health status prediction model is introduced, leveraging a Deep Convolutional Gated Recurrent Unit (DCGRU) approach. This model ingeniously combines Convolutional Neural Network (CNN) and Gated Recurrent Unit (GRU) processes, where the GRU network extracts pivotal directional characteristics, and the CNN architecture discerns complex interrelationships within the data. Security of the data management system is fortified through the implementation of the twofish encryption algorithm. The efficacy of the proposed model is rigorously evaluated using standard medical datasets, including Diabetes and EEG Eyestate, employing diverse performance metrics. Experimental results demonstrate the model's superiority over existing best practices, achieving a notable accuracy of 0.884. Furthermore, comparative analyses with the Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC) models reveal enhanced performance metrics, with the proposed model achieving a processing time and throughput of 40 and 45.42, respectively.

Authors and Affiliations

Kumar Raja Depa Ramachandraiah, Naga Jagadesh Bommagani, Praveen Kumar Jayapal

Keywords

Related Articles

An Enhanced QoS-Aware Multipath Routing Protocol for Real-Time IoT Applications in MANETs

Recent transmission of large volumes of data through mobile ad hoc networks (MANETs) has resulted in degraded Quality of Service (QoS) due to factors such as packet loss, delay, and packet drop in multipath routing. To a...

Leveraging Artificial Intelligence for Blackhole Attack Detection in MANETs: A Comparative Study

Blackhole attacks represent a significant threat to the security of communication networks, particularly in emerging network architectures such as Mobile Ad Hoc Networks (MANETs). These attacks, characterized by their ab...

Multi-Channel Scheduling for Short-Range Wireless Communication Networks Using a Q-Learning Feedback Mechanism

The traditional channel scheduling methods in short-range wireless communication networks are often constrained by fixed rules, resulting in inefficient channel resource utilization and unstable data communication. To...

Crowd Density Estimation via a VGG-16-Based CSRNet Model

Accurate crowd density estimation has become critical in applications ranging from intelligent urban planning and public safety monitoring to marketing analytics and emergency response. In recent developments, various me...

Cryptocurrency Investigations in Digital Forensics: Contemporary Challenges and Methodological Advances

Digital forensics, a crucial subset of cybersecurity, encompasses sophisticated tools and methodologies for the interpretation, analysis, and investigation of digital evidence, facilitating the identification and mitigat...

Download PDF file
  • EP ID EP732663
  • DOI https://doi.org/10.56578/ida020402
  • Views 84
  • Downloads 0

How To Cite

Kumar Raja Depa Ramachandraiah, Naga Jagadesh Bommagani, Praveen Kumar Jayapal (2023). Enhancing Healthcare Data Security in IoT Environments Using Blockchain and DCGRU with Twofish Encryption. Information Dynamics and Applications, 2(4), -. https://europub.co.uk/articles/-A-732663