Maintaining Security of Patient Data by Employing Private Blockchain and Fog Computing Technologies based on Internet of Medical Things

被引:0
|
作者
Razzaq, Rasha Halim [1 ]
Al-Zubaidie, Mishall [1 ]
机构
[1] Department of Computer Sciences, Education College for Pure Sciences, University of Thi-Qar, Nasiriyah,64001, Iraq
来源
Informatica (Slovenia) | 2024年 / 48卷 / 12期
关键词
The Internet of Medical Things (IoMT) is a vital component of the Internet of Things (IoT); and its importance lies in the urgent need for it and its provision of many medical services; such as examining and monitoring patients in hospitals and their homes. Given the presence of huge amounts of data based on the IoMT in the cloud system; data storage methods should witness a major revolution; and given the exposure of IoMT systems to electronic attacks; as recent studies have indicated; which makes them unsafe; data must be protected with security systems. In our work; we propose a Cryptography Health Security System (CryptoHSS) to support medical IoT security. Our proposed CryptoHSS relies on Decision Tree (DT); Naive Bayes (NB); Two-Fish; and Jellyfish algorithms within Private Blockchain (PBC) and Fog Computing to build robust security measures. The Two-Fish encryption algorithm is used to provide anonymity of medical information. In our proposed system; NB is used to quickly classify patient data; while DT is used to make accurate medical decisions based on the collected data. The Jellyfish algorithm was used to detect similarities between data and increase the security of data transmission within CryptoHSS. Two-Fish; NB; DT; and Jellyfish algorithms are designed to work in harmony with PBC. CryptoHSS distributes and manages peer-to-peer data in IoMT. The benefit of Fog Computing (FC) is that it speeds up the decision-making process without moving to distant clouds. We analyzed our system in terms of performance and security. Our results indicate that CryptoHSS provides lightweight operations to support complex security measures that qualify it to support health organizations. In terms of security; our system provides reliable security against attacks by keeping medical data encrypted and confidential; with the encryption and decryption rate with the Two-Fish algorithm reaching more than 98%; in addition to providing diagnosis of medical conditions and making appropriate medical decisions. © 2024 Slovene Society Informatika. All rights reserved;
D O I
10.31449/inf.v48i12.6047
中图分类号
学科分类号
摘要
引用
收藏
页码:65 / 80
相关论文
共 50 条
  • [41] Processing model for fog computing applied to internet of medical things (IoMT)
    Ramirez Lopez, Leonardo Juan
    Ramirez Maldonado, Engler
    Rojas Reales, Wilson Mauro
    2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 957 - 963
  • [42] FogChain: A Fog Computing Architecture Integrating Blockchain and Internet of Things for Personal Health Records
    Mayer, Andre Henrique
    Rodrigues, Vinicius Facco
    da Costa, Cristiano Andre
    Righi, Rodrigo da Rosa
    Roehrs, Alex
    Antunes, Rodolfo Stoffel
    IEEE ACCESS, 2021, 9 : 122723 - 122737
  • [43] Distributed Fog Computing for Internet of Things (IoT) Based Ambient Data Processing and Analysis
    Ahmed, Mehreen
    Mumtaz, Rafia
    Zaidi, Syed Mohammad Hassan
    Hafeez, Maryam
    Zaidi, Syed Ali Raza
    Ahmad, Muneer
    ELECTRONICS, 2020, 9 (11) : 1 - 20
  • [44] Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
    Cherbal, Sarra
    Zier, Abdelhak
    Hebal, Sara
    Louail, Lemia
    Annane, Boubakeur
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (03): : 3738 - 3816
  • [45] An efficient indexing for Internet of Things massive data based on cloud-fog computing
    Benrazek, Ala-Eddine
    Kouahla, Zineddine
    Farou, Brahim
    Ferrag, Mohamed Amine
    Seridi, Hamid
    Kurulay, Muhammet
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (03)
  • [46] Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
    Sarra Cherbal
    Abdelhak Zier
    Sara Hebal
    Lemia Louail
    Boubakeur Annane
    The Journal of Supercomputing, 2024, 80 : 3738 - 3816
  • [47] A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities
    Tange, Koen
    De Donno, Michele
    Fafoutis, Xenofon
    Dragoni, Nicola
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (04): : 2489 - 2520
  • [48] Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing Systems
    Moh, Melody
    Raju, Robinson
    PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 709 - 715
  • [49] Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing
    Sehgal, Vivek Kumar
    Patrick, Anubhav
    Soni, Ashutosh
    Rajput, Lucky
    INTELLIGENT DISTRIBUTED COMPUTING, 2015, 321 : 251 - 263
  • [50] An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain
    Awadallah, Ruba
    Samsudin, Azman
    Teh, Je Sen
    Almazrooie, Mishal
    IEEE ACCESS, 2021, 9 : 69513 - 69526