Abstract
The advent of Artificial Intelligence (AI) and the Internet of Things (IoT) have recently created previously unimaginable opportunities for boosting clinical and patient services, reducing costs and improving community health. Yet, a fundamental challenge that the modern healthcare management system faces is storing and securely transferring data. Therefore, this research proposes a novel Lionized remora optimization-based serpent (LRO-S) encryption method to encrypt sensitive data and reduce privacy breaches and cyber-attacks from unauthorized users and hackers. The LRO-S method is the combination of hybrid metaheuristic optimization and improved security algorithm. The fitness functions of lion and remora are combined to create a new algorithm for security key generation, which is provided to the serpent encryption algorithm. The LRO-S technique encrypts sensitive patient data before storing it in the cloud. The primary goal of this study is to improve the safety and adaptability of medical professionals’ access to cloud-based patient-sensitive data more securely. The experiment’s findings suggest that the secret keys generated are sufficiently random and one of a kind to provide adequate protection for the data stored in modern healthcare management systems. The proposed method minimizes the time needed to encrypt and decrypt data and improves privacy standards. This study found that the suggested technique outperformed previous techniques in terms of reducing execution time and is cost-effective.
Keywords: smart hospital system, internet of things, security and privacy, optimization, artificial intelligence, healthcare data
1. Introduction
Technological advancements have made a modern method to improve human life quality possible [1]. The IoT is an innovative and developing paradigm gaining interest in several application sectors, including smart homes, smart environments, and personal and remote healthcare [2]. Research and technology researchers have identified and evaluated health data sources to learn more and solve health-related challenges [3]. Therefore, creating integrated healthcare technology can boost productivity and increase patient outcomes at every level of the medical system [4]. The world’s largest and fastest-growing industry is the healthcare sector. How healthcare is managed has changed over the past several years from a disease-centered approach to a patient-centered one [5] and a volume-based approach to a value-based strategy of healthcare delivery. The growing drive for patient-centered treatment and value-based healthcare delivery models is guided by the goals of raising public awareness of the excellence of healthcare and reducing costs [6].
By utilizing strong patient safety controls, widespread access to data, remote inpatient monitoring, quick intervention strategies, and decentralized electronic medical records, the creation of new IoT-based healthcare software applications can address some issues associated with conventional healthcare systems [7]. A system created to handle healthcare data is referred to as a medical information system (MIS). This includes the practical administration of a hospital or a system that supports the formulation of healthcare policy, as well as systems that gather, store, handle, and send a patient’s electronic medical record (EMR) [8]. These techniques can increase the quality of life for patients, boost cooperation, boost patient outcomes, lower costs, and boost the overall efficiency of e-healthcare services [9]. Systems that manage data linked to the operations of providers and healthcare groups are also included in the category of health information systems. These could be used in concert to impact research, better patient results, and improve policy and decision making. Because expenditures in extensive data analysis can be significant and create a demand for effective, affordable technology, using the cloud to study big data in healthcare stands to reason [10]. Security is a top priority because medical information systems frequently view, handle, or keep huge amounts of sensitive data. Since the equipment is typically attached to an internal network that is linked to the Internet, it is also susceptible to viruses from devices and other equipment carried into hospitals. Different kinds of malicious attacks can be caused by the attackers [11].
A form of malicious software known as ransomware stops you from reaching your device’s information, infrastructure, or networks and requests a ransom in exchange for their release. These assaults, which have been linked to issues with medical processes, disrupted patient treatment, according to more than half of ransomware victims. The probability of returning to care redirection following an assault was the greatest impact noted. If a hacker seizes control, they can instruct devices to provide false readings, deliver medication drug overdoses, or take other actions that jeopardize the health of patients [12]. Due to the substantial quantity of confidential data that healthcare organizations keep for patient treatment and activities, the sector is seen as a target-rich environment. Consequently, cybercriminals have shifted their focus from the banking industry and retail shops to healthcare facilities due to personal health information potential value being up to 50 times greater than finance data; it can be valuable to attackers. Hospitals are important infrastructure companies that keep, exchange, and use a lot of private information. To provide patients with vital medical treatment, healthcare centers also rely on a number of IoT devices and electronic medical records [13]. This particular combo appeals to cybercriminals as a prize deserving of a hefty ransom that will be rapidly paid. However, becoming a primary target involves more than just motivation and pressure. Hospitals are an excellent target for devastating malware assaults as a result of a number of current occurrences that have combined to create the perfect storm [14].
Identity theft is a major problem for cybercriminals, as it can lead to the theft of personal information such as insurance, names, policy numbers, birth dates, billing data, diagnosis codes, and bank and credit card information [15]. Fraudsters use data from healthcare organizations to create fake IDs, resell medical equipment, and file made-up claims with insurers. Many users are unaware that they have been compromised, leading to unexpected consequences and rampant medical card theft. Medical identity theft is the act of someone using confidential information such as a social security number, without permission, to make false claims to Medicare and other health insurers, which can waste government money and interfere with medical treatment [16]. These identity thefts are correlated to criminal forgery theft. The use of tools, procedures, and measures to defend against cyberattacks on networks, applications, gadgets, systems, and data is known as cyber security. Its objectives are to lower the danger of cyberattacks and safeguard against the unauthorized use of innovations, networks, and platforms [17].
Early in the COVID-19 pandemic, it was unclear how healthcare costs and use would alter globally. Although a pandemic may lead to higher health expenses, spending and use declined [18] due to other considerations. The cost of combating fraud and upholding rules is a factor. Expensive antivirus software must be obtained to shield private patient data from hackers [19]. Due to this, healthcare costs must increase to maintain patient and data security. AI and machine learning have revolutionized healthcare, particularly in medical specialties. The medical disciplines make significant use of computer systems with artificial intelligence, such as remote patient treatment, prescription transcription, enhancing doctor–patient contact, drug research and development from beginning to finish, and patient diagnosis [20]. Modern computer algorithms have recently attained accuracy levels that are comparable to those of human specialists in the field of medical sciences, despite the fact that computer systems frequently perform jobs more quickly than humans do. The goal of separating rhetoric from reality is discussing how AI is reshaping the field of medicine. AI can help healthcare organizations cut costs by deploying more sophisticated technology that is more accurate and well-suited to carry out particular functions [21]. Ensuring that the appropriate care and support are adequately suited to their health objectives might lower the number of necessary diagnostic tests and the readmission rate. It can help physicians by automatically identifying potential issues and alerting medical staff [22]. Additionally, they would lessen the likelihood of misdiagnoses and medical malpractice claims, which can add to costs.
AI applications can deal with the enormous amounts of data generated in the medical field and discover valuable knowledge that would otherwise be hidden in big medical data. Healthcare stakeholders may use AI-based computational tools to harness the power of data to review historical data, anticipate prospective outcomes, and identify the optimal actions for the current context. As a result, AI is becoming more essential to healthcare stakeholders in decision-making [23]. When putting privacy protection measures in place inside a specific system, this service represents a possible privacy breach that must be considered. End users are now more concerned than ever with the privacy of their health data due to increasing awareness among them [24]. New types of cyber-attack will be made possible by advances in AI. These attacks may use AI systems to do specific tasks more effectively than humans could or exploit flaws in AI systems that humans cannot control.
Additionally, AI systems regulate elements of malware and robot behavior that are impossible for humans to hold [25] manually. In the past, several security measures were put out to protect the transmission of patient data to hospitals [26,27,28,29]. However, the high cost and lengthy process prevent the best option from being implemented. Therefore, this research proposes a new cost-effective security algorithm for an intelligent hospital management system for COVID-19 data transmission. The significant contribution of this research is summarized as follows:
-
▪
Gather the IoT-sensed data of COVID patients from different remote areas.
-
▪
Apply the LRO-based serpent (S) encryption algorithm to secure data transmission.
-
▪
The asymmetric hash signature function is validated for key validations from the sender and receiver.
-
▪
Investigate the effectiveness of the proposed system using various parameter metrics.
The remaining parts of the article are arranged as follows. The access control model’s benefits and shortcomings are discussed in Section 2 of the literature review. Section 3 covers our proposed system. Section 4 of the concept discusses the performance evaluation of the algorithms. Section 5 concludes the work by providing recommendations for more research.
2. Related Work
In this section, we review the most recent research and compare the options that are currently available for security and anonymity in smart healthcare systems. As new devices proliferate, they often integrate the Internet of Things (IoT), generating and exchanging a massive quantity of data in the process. As a result, providing protection in an IoT setting is more difficult than expected. Properties such as secrecy, integrity, authorization, privacy, permission, and availability must all be ensured in order to ensure security in the IoT. Following is a summary of specific recent articles related to this research: Thilagam, K. et al. [30] offered IoT-based deep learning techniques based on privacy protection and a data analytics system. The health-related data are examined in the cloud using a convolutional neural network (CNN), free of user privacy data. As a result, a safe access control component is introduced for the IoT–Healthcare system based on user attributes. Furthermore, a higher user count enables an accuracy of about 98%. Experimental research shows that the suggested solution is reliable and efficient in terms of little privacy leakage and good data integrity.
Ali, Aitizaz et al. [31] created a novel deep-learning strategy-based secure searchable blockchain that functions as a distributed database and uses homomorphic encryption to allow users to access data safely via search. Using an IoT dataset, this study evaluated and compared the recommended access control mechanisms to reference models. The hyper ledger tool’s smart contracts implement the suggested algorithms. Compared to reference models, our proposed method considerably enhances security, privacy, and user behavior tracking, leading to a more effective blockchain-based IoT system.
Deep learning (DL) methods were combined with authorized blockchain and intelligent contracts by Kumar, Randhir et al. [32] to create the unique, safe, and effective data-sharing model PBDL. To be more precise, PBDL has a blockchain-based system to register, authenticate (using zero-knowledge evidence), and verify the communicating parties before employing an innovative contract-based agreement method. The healthcare data are encoded or transformed into a new format using stacked sparse variational autoencoding (SSVAE) in this technique. In addition, the attack detection mechanism is identified and enhanced using self-attention linked bidirectional long short-term memory (SA-BiLSTM).
Kute, Shruti Suhas et al. [33] provided a study of cutting-edge research involving the IoT in healthcare, particularly on obesity, overweight, and persistent degenerative illnesses. Secrecy, integrity, authentication, access, trust, validation, information management, and storage and availability issues must be resolved for IoT in real-world applications. A description of the security, privacy, and trust problems in IoT-based machine learning depending on healthcare systems is also provided in this study.
Using a hybrid deep neural network system, Ali, Aitizaz et al. [34] proposed a new group theory (GT) that depended on the binary spring search (BSS) technique. The blockchain was presented as a distributed database to guarantee secure tracking and keyword-based access to the dataset. The proposed methodology also offered a secure critical revocation method, and various policies were updated accordingly. The security of patient healthcare information access systems incorporating blockchain and a confidence chain addressed the efficiency and safety difficulties in the existing schemes for exchanging both forms of digital healthcare data.
One such IoT and cloud computing application was the topic of a study by Anuradha, M. et al. [35]. This work’s primary goal was to develop a cancer prediction system utilizing the Internet of Things after extracting the specifics of blood results to determine whether they were normal or abnormal. Additionally, the blood results of cancer patients were encrypted and stored in the cloud for easy Internet access by doctors and nurses who needed to handle patient data discreetly. This focused on improving the calculations and processing in the healthcare industry. To offer authentication and security when dealing with patients with cancer, encryption and decryption were performed using the AES method.
Initial emphasis was placed on the fundamental security requirements for a Body Sensor Network (BSN)-based contemporary healthcare system. As a result, BSN-Care was proposed, a successful IoT-based healthcare system that enabled BSN to effectively meet these requirements Satyanarayan et al. [36].
The Authentication, Authorization, and Audit Logs (AAA) services were achieved by FBASHI, a system built on blockchain technology and fuzzy logic Zulkifl, Z. and Khan et al. [37]. This work provided a heuristic method for conducting driven flexible security, offering AAA services for medical care IoTs and networks based on the blockchain. It also suggested an approach for action driven flexible security using fuzzy logic.
For IoT-enabled hospitals, a reciprocal authentication method that protects privacy was suggested by Das, S. and Namasudra in order to accomplish quick and efficient network device verification [38]. This suggested authentication method was built using lightweight cryptographic primitives, such as XOR, combination, and hash operation, to accommodate the computing power of the IoT devices. The suggested strategy could block unwanted devices from accessing healthcare networks by establishing a safe connection between an approved device and a gateway.
The summary of related work is provided in Table 1. In all of these approaches, data protection and confidentiality are lessened. Additionally, all of the aforementioned techniques usually come lacking in terms of security efficiency and accuracy. The performance metrics are much less for evaluation and inaccurate for huge amounts of data. Consequently, this study suggests a novel efficient optimization-based security method for data transfer in an intelligent healthcare management system.
Table 1.
Reference | Methods | Systems | Key Results | Advantages | Limitations |
---|---|---|---|---|---|
Thilagam, K. et al. [30] | CNN | Private healthcare data | Accuracy, Recall, F1-score, Precision, False Alarm Rate, and Missed Detection Rate. | Data integrity and privacy leaks are both minimal. | High time and cost consumption. |
Ali, Aitizaz et al. [31] | homomorphic encryption | Digital healthcare | Throughput, encryption time, decryption time, latency, and computational cost. | Gives consumers more flexibility. | The loss function is high. |
Kumar, Randhir et al. [32] | PBDL (SSVAE and SA-BiLSTM) | Industrial healthcare | Transmission efficiency, encryption and decryption time, accuracy, and loss. | Secured authenticated data transmission and attack detection. | More extended training period and slower prototype. |
Kute, Shruti Suhas et al. [33] | Machine learning | IoT-based healthcare | Accuracy, loss, and confidential rate. | Effective validation is achieved for different sickness. | Need to address real-time challenges. |
Ali, Aitizaz et al. [34] | GT-BSS | Digital healthcare | Throughput, encryption time, decryption time, latency, and computational cost. | Limits security problems to patient data. | Very low test accuracy. |
Anuradha, M. et al. [35] | AES | Cancer prediction system | Cost and time. | High-security function. | A small amount of data is considered for validation. |
Satyanarayana, T.V.V. et al. [36] | BSN | Medical system | CPU cycles and execution time. | Security needs are effectively solved. | Very few metrics are validated for the performance evaluation. |
Zulkifl, Z., Khan et al. [37] | FBASHI | Hospital department | Latency and throughput. | Different kinds of attacks are evaluated. | Lack of evaluation metrics. |
Das, S. and Namasudra [38]. | Lightweight cryptographic primitives | Healthcare center | Computation cost and execution time. | Feasible for lightweight and low resource IoT gadgets. | Only applicable for low resource IoT gadgets and systems. Additionally, less data. |
3. Proposed Methodology
The proposed design of security management in smart healthcare management is illustrated in Figure 1. The COVID data were collected locally and globally by IoT-based sensors, which was helpful for electronic medical records administration. The serpent (S) encryption technique based on LRO to protect data transfer from sensed data was applied. The LRO algorithm created the secure key for the serpent algorithm. The wearable IoT device stored its acquired data on a cloud server and was open to hacker attacks and privacy violations from unauthorized users. The asymmetric hash signature function was validated in the intelligent healthcare management system for critical validations from the sender and receiver. If both perform the same position, only the secret key was sent to the recipient, who may then use it to decode the data. A similar process was used for hospital-based medical professionals.
3.1. Lionized Remora Optimization
The LRO is the combination of the lion and remora optimization functions. The functions of both systems are hybrid to form an improved approach. The parameter in the problem , where is the number of the secret key, is the dimension in the search space of the secret key and represents the current point, and the possible solution in the suggested LRO technique is meant to be a secret key. The ideal algorithmic solution is symbolized by , and how the goal in biological actions is represented is . An algorithm should have a fitness function for each probable solution. It might be worded such as this . The equivalent formula for calculating the fitness function’s value is . Using Equation (1), the algorithm saves the best fitness value associated with the best secret key location.
(1) |
Furthermore, the secret key, scattered around the search area, is the key to finding a solution. Other marine life or ships are just aids in the secret key’s mechanism for updating locations; they are not the method itself. These technologies allow the secret key to find the appropriate place in the neighborhood.
Key Exploration: One may imagine the target point updating simultaneously with the secret key connected to it. The position update formula was modified to offer the following equations based on the novel idea underlying this method:
(2) |
In the above equation, T denotes the total number of iterations while, and denotes the number of iterations that have already occurred. designates a random location. Elite decides when to begin the upgrading in the traditionally preferred location of the secret key. Secret keys are added randomly to make it possible to explore the search area. Whether an animal has devoured prey or its current fitness level is higher than the previous generation largely determines which secret key to use for which host. Actually, “Experience attack” is utilized to calculate the value of the current fitness function. Similar to how experience accumulates over time, the tuyu must frequently take a little step around the host to determine whether it is necessary to move hosts. When the notions mentioned earlier are modeled, the formula is as follows:
(3) |
where denotes the perspective of the previous generation, which may be viewed as a type of experience, and suggests a reluctant action. The decision to utilize the is made because when the secret key moves only so aggressively; it can be perceived as a “small global” movement. This mechanism, which has seen a more comprehensive range of evolution, may successfully depart from the local optimal while considering predictability. A decision-making stage is then required, after which the secret key randomly chooses whether or not to repair the host. The comparison of the fitness function values between the suggested solution and the current solution are used to evaluate this algorithmic phase. The condition for the point
(4) |
where is the current weight of the key, is the random number, and is the new weight of the key. The center value of the key point is evaluated using Equation (5)
(5) |
The successive rate of this execution for best fitness is achieved using Equation (6)
(6) |
When attempting to solve the minimum problem, for instance, if the fitness function value obtained from the LRO is less than the value obtained by the current solution,
(7) |
The secret key for the local optimum chooses a unique feeding approach. Host selection will resume if the suggested solution’s fitness function value exceeds the current solution’s value.
Key Exploitation: The equation for changing the location of the whale’s secret key was deleted. As illustrated below:
(8) |
(9) |
(10) |
(11) |
The positions of a secret key attached to a whale can be taken for granted in a larger solution space. Here, is the distance between the attacker and is the best choice at the moment; is a random value between [1, 1] and [2, 1] and shrinks exponentially after that. Host feeding is another step in the exploitation process. Now, the ideal solution may be compressed to the location space of the host. Small actions performed on or close to the host are described mathematically as:
(12) |
(13) |
(14) |
(15) |
In this instance, was used to denote a little movement associated with the volume space of the host and secret key. The position of the secret key was to differentiate between the functions of the host and secret key in the solution space, and the position of the secret key was constrained using a secret key factor. If the host had a volume of 1, the volume of the secret key was about a portion of the host’s volume. Once the ideal answer had been found, the function ceased; otherwise, it continued for the following iteration. Figure 2 provides the LRO algorithm flowchart.
3.2. Serpent Security Strategy
We presented a serpent model, an extremely efficient block cipher architecture that is also quite conservative. It employs S-boxes such as those of the Data Encryption Standard (DES) in a novel form that permits a faster avalanche, a more effective bit slice execution, and a simple analysis that lets us prove it’s secure against all known types of attacks. The serpent has a block size of 128 bits and uses a 32-round network with four 32-bit words. Bitstreams are used to encode every value that is utilized in the encryption. In a single 32-bit word, the bit pointers are numbered from 0 to bit 31, from 0 to bit 127 for 128-bit blocks, from 0 to bit 255 for 256-bit keys, and so on. All values are written in the little for internal calculation, where word 0 is the least relevant, word n is the most significant word, and bit 0 is the least pertinent bit of word n. Each block is represented externally as a simple 128-bit hex integer. The plaintext is transformed into the first intermediate data, , and then the 32 rounds are used, each of which has three operations .
Key Collaboration: A 128-bit subkey is exclusive OR’ed with the present intermediate node at each round.
S-Boxes: Four 32-bit words make up the 128-bit input + key combination. These four words are put through the S-box, implemented as a series of logical operations, producing four output words as a consequence. As a result, the CPU is used to run all 32 duplicates of the S-box at once, producing using Equation (16)
(16) |
Linear Transformation: Each of the output words’ 32 bits is linearly mixed, by
(17) |
(18) |
where << stands for shift and <<< for rotation. This linear transformation is substituted in the last round by an extra key mixing:
(19) |
To enhance the avalanche effect, the linear transformation was used in the first place and . Since the different pairs of 0 through 1, 3, 5, 7, and 13 modulo 32 have only one ordinary member, the S-boxes receive the property that a 1-bit transformation will result in two variables to the output bits. A 1-bit change will result in maximum bit changes after two rounds and beyond. After three rounds, each plaintext bit and round key bit impact all the data bits. It is still assured that each key bit impacts each information bit for six cycles, even if an adversary selects certain subkeys and proceeds backward. The second argument is that it is straightforward and requires the fewest pipeline delays possible on a modern processor. The third reason is that we could put constraints on the probability of the differential and linear features by analyzing them using the block cipher analysis algorithms we built. These constraints demonstrate how this option is appropriate for this research.
Decryption: Inverse S-boxes, an inverse linear transformation, and the subkeys’ reversed order are all necessary for decryption, which sets it apart from encryption. The flowchart of the serpent security approach is illustrated in Figure 3.
3.3. Asymmetric Hash Signature
The security of this system is improved more than by the encrypted hash function. If the hash function of both senders and the medical experts are the same, then only they can access the data. A key generation technique randomly chooses one private key from a list of potential private keys. The LRO algorithm produces the private key and a matching public key. A signature-producing signing method generates a signature from data and a private key. The process for validating signatures either accepts or denies the data’s claim to authenticity depending on the data, public key, and sign. The signing algorithms establish a one-way hash of the digital data that has to be signed to create a digital signature. The hash value is, subsequently, encrypted by the signing method using the private key. The signature consists of this encrypted hash and other details such as the hashing technique. Finally, the data are transmitted to the verifier with this signature attached. Because a hash function may transform any random input into a much smaller fixed-length result, it is preferable to encrypt the hash rather than the entire message or document. Therefore, it will help to save time, since one must now sign a smaller hash value instead of a lengthy document, and hashing is considerably quicker than signing. The same hash function produces a hash value from the received data. The signature is legitimate if they are both equivalent; otherwise, it is illegitimate. The flowchart of the proposed Asymmetric Hash Signature is illustrated in Figure 4.
4. Result and Discussion
The proposed security framework was built on a Windows system equipped with an i5 CPU and 4 GB of RAM using the MATLAB 2019a program. In this research, COVID-19 data are used to transmit and validate the security of the system. The data are gathered from a database management system (DBMS), which was initially established in the 1960s. DBMSs often provide database–server capability. Several DBMSs (such as MySQL) only use the client–server paradigm for accessing databases, whereas some (such as SQLite) are designed to be used as integrated databases [39]. Patients can use the DBMS to see and compare different treatments for a specific patient’s clinical condition, allowing them to select a course of therapy that is also practical for their insurers. The patient’s health status will be recorded by a sensor in this health tracking device. However, the DBMS makes the data look complex. Moreover, several factors, such as encryption and decryption times, time complexity, energy use, cost-effectiveness, and others, were validated for the performance analysis of the suggested model compared to the existing approaches, and an optimization algorithm and a security algorithm were used to ensure that the data transmission process was carried out securely.
4.1. Performance Analysis
The proposed method was compared with the different conventional methods such as CNN [23], homomorphic [24], PBDL [25], GT-BSS [27], and AES [28] in terms of encryption time, decryption time, resource optimization, execution time, delay, key generation, and so on.
4.2. Encryption Time
The time it takes to encrypt data from plain to cipher data is the encryption time.
(20) |
Figure 5 compares the projected time required for encryption to the current models. The encryption process takes longer as the data size increases. The presentation demonstrates that the suggested technique outperforms the standard methods for files of various sizes, including 100 kb, 200 kb, 300 kb, 400 kb, and 500 kb, due to the suggested model’s far shorter encryption time than the preceding approaches.
4.3. Decryption Time
The time it takes to decode data from cipher data to original data is referred to as decryption time.
(21) |
The suggested time needed for decryption is compared to the present models in Figure 6. As data size grows, so does the amount of time required for decryption. The presentation demonstrates that the suggested technique outperforms the standard methods for files of various sizes, including 100 kb, 200 kb, 300 kb, 400 kb, and 500 kb. In addition, because it takes much less time to decode data than prior approaches, the suggested model offers several advantages.
4.4. Key Generation
Figure 7 compares the time required for key generation in the proposed security system with various values from previous models. Key generation is much quicker than conventional methods.
4.5. Key Size
Keys regulate a cipher’s operation; only the correct key can decrypt a communication and reveal its plain text content. Since many encryption methods are based on or made publicly available, the system’s security, assuming no analytic attack, is only decided by how difficult it is to obtain the key. Therefore, estimating key size is crucial since it establishes the number of bits in a key that a security method will use. Figure 8 provides the comparative analysis for key size.
4.6. Confidential Rate
The confidential rate is based on the differential between data that is sent and received during a data transfer. Figure 9 compares the performance analysis of the suggested confidential rate with the traditional approaches. The proposed system’s validation of the confidential rate is estimated for various file sizes. The conventional method has, however, become much less secretive over time. The results demonstrate how well the suggested model’s security function works.
4.7. Resource Optimization
The transfer between data size and resource optimization is shown in Figure 10. It has been shown that the cost grows linearly with data size. Compared to the preceding models, the cost is optimized to an impressive degree.
4.8. Execution Time and Delay
The relationship between data size and resource optimization is depicted in Figure 11, and it is deduced that energy consumption decreases as the quantity of data increases, but the charge drain increases. Additionally, it has been noted that resources are cost-effectively optimized.
Execution time and average delay are the two crucial factors when assessing the implemented model. However, data transmission computation and average delay for all employed smart hospital management data security are nearly consistent, as illustrated in Figure 12 and Figure 13. The suggested methodology is, therefore, highly scalable regarding the volume of data and the number of data transmissions carried out. Furthermore, in a smart hospital framework, our proposed solution provides the safe storage and accessibility of dispersed medical records. Thus, the analysis shows the adequate performance of the proposed security system over the earlier methods.
5. Conclusions
The use of cost-effective security in an intelligent hospital healthcare system was the primary focus of this research study. Here, remote patients’ COVID-19 information was gathered and processed via the IoT. As a result, sensitive patient data were encrypted using the LRO-S method and then saved in a cloud environment. Then, an asymmetric hash signature method was used to strengthen the security mechanism. Increasing the security and flexibility of medical professionals’ access to patient information stored in the cloud was the key focus of this research project. According to the testing findings, the secret keys created from upgraded participants were sufficiently random and one-of-a-kind to protect the IoT in smart hospital management systems. The effects of the suggested approach demonstrated a decrease in encryption and decryption times and an increase in confidentiality rates. The proposed healthcare framework used less energy, money, and processing time than the techniques examined. This study ensured the safe communication of medical information between patients and doctors while reducing healthcare costs. Future research will use deep learning technology to predict and protect against numerous cancers, including breast, blood, lung, skin, and other types.
Acknowledgments
The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number “IFPRC-166-611-2020” and King Abdulaziz University, DSR, Jeddah, Saudi Arabia.
Author Contributions
Conceptualization, A.I.K. and A.S.A.; Methodology, A.A.; Software, A.I.K.; Validation, A.S.A.; Formal analysis, F.A.; Investigation, A.A.; Resources, F.A.; Writing—original draft, Y.B.A.; Writing—review & editing, A.I.K. All authors have read and agreed to the published version of the manuscript.
Data Availability Statement
The datasets that were used in this study are available online on the following link IoT Healthcare Security Dataset https://www.kaggle.com/datasets/faisalmalik/iot-healthcare-security-dataset accessed on 15 November 2022.
Conflicts of Interest
The authors declare that they have no conflict of interest to report regarding the present study.
Funding Statement
This work was funded by Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia, IFPRC-166-611-2020.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
References
- 1.Land K.J., Boeras D.I., Chen X.-S., Ramsay A.R., Peeling R.W. REASSURED diagnostics to inform disease control strategies, strengthen health systems and improve patient outcomes. Nat. Microbiol. 2019;4:46–54. doi: 10.1038/s41564-018-0295-3. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 2.Marques G., Pitarma R.M., Garcia N., Pombo N. Internet of things architectures, technologies, applications, challenges, and future directions for enhanced living environments and healthcare systems: A review. Electronics. 2019;8:1081. doi: 10.3390/electronics8101081. [DOI] [Google Scholar]
- 3.Shafique K., Khawaja B.A., Sabir F., Qazi S., Mustaqim M. Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access. 2020;8:23022–23040. doi: 10.1109/ACCESS.2020.2970118. [DOI] [Google Scholar]
- 4.Mansour R.F., El Amraoui A., Nouaouri I., Diaz V.G., Gupta D., Kumar S. Artificial intelligence and internet of things enabled disease diagnosis model for smart healthcare systems. IEEE Access. 2021;9:45137–45146. doi: 10.1109/ACCESS.2021.3066365. [DOI] [Google Scholar]
- 5.Zeadally S., Siddiqui F., Baig Z., Ibrahim A. Smart healthcare: Challenges and potential solutions using internet of things (IoT) and big data analytics. PSU Res. Rev. 2020;4:149–168. doi: 10.1108/PRR-08-2019-0027. [DOI] [Google Scholar]
- 6.Zhu H., Wu C.K., Koo C.H., Tsang Y.T., Liu Y., Chi H.R., Tsang K.-F. Smart healthcare in the era of internet-of-things. IEEE Consum. Electron. Mag. 2019;8:26–30. doi: 10.1109/MCE.2019.2923929. [DOI] [Google Scholar]
- 7.Chen H., Khan S., Kou B., Nazir S., Liu W., Hussain A. A smart machine learning model for the detection of brain hemorrhage diagnosis based internet of things in smart cities. Complexity. 2020;2020:3047869. doi: 10.1155/2020/3047869. [DOI] [Google Scholar]
- 8.Ennafiri M., Mazri T. Innovations in Smart Cities Applications Volume 4: The Proceedings of the 5th International Conference on Smart City Applications. Springer International Publishing; Cham, Switzerland: 2021. Internet of things for smart healthcare: A review on a potential IOT based system and technologies to control COVID-19 pandemic. [Google Scholar]
- 9.Malikov M.R., Rustamov A.A., Ne’matov N.I. Strategies for Development of Medical Information Systems. Theor. Appl. Sci. 2020;89:388–392. doi: 10.15863/TAS.2020.09.89.49. [DOI] [Google Scholar]
- 10.Kelly J.T., Campbell K.L., Gong E., Scuffham P. The Internet of Things: Impact and implications for health care delivery. J. Med. Internet Res. 2020;22:e20135. doi: 10.2196/20135. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 11.Javaid M., Khan I.H. Internet of Things (IoT) enabled healthcare helps to take the challenges of COVID-19 Pandemic. J. Oral Biol. Craniofacial Res. 2021;11:209–214. doi: 10.1016/j.jobcr.2021.01.015. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 12.Serna S. Ph.D. Thesis. Utica University; Utica, NY, USA: 2022. The Increase of Ransomware Attacks within the Healthcare and Education Sector. [Google Scholar]
- 13.Buzdugan A. Integration of cyber security in healthcare equipment; Proceedings of the 4th International Conference on Nanotechnologies and Biomedical Engineering: Proceedings of ICNBME-2019; Chisinau, Moldova. 18–21 September 2019; Cham, Switzerland: Springer International Publishing; 2020. pp. 681–684. [Google Scholar]
- 14.Scott C.R. Ph.D. Thesis. Utica University; Utica, NY, USA: 2022. Comparing Cybercrime in Banking and Healthcare Sectors. [Google Scholar]
- 15.Richardson R., North M.M., Garofalo D. Ransomware: The landscape is shifting-a concise report. Int. Manag. Rev. 2021;17:5–86. [Google Scholar]
- 16.Minnaar A., Herbig F.J. Cyberattacks and the cybercrime threat of ransomware to hospitals and healthcare services during the COVID-19 pandemic. Acta Criminol. Afr. J. Criminol. Vict. 2021;34:155–185. [Google Scholar]
- 17.Ma K.W.F., McKinnon T. COVID-19 and cyber fraud: Emerging threats during the pandemic. J. Financ. Crime. 2022;29:433–446. doi: 10.1108/JFC-01-2021-0016. [DOI] [Google Scholar]
- 18.Alam T., Benaida M. Internet of things and blockchain-based framework for Coronavirus (COVID-19) disease. Int. J. Online Biomed. Eng. 2022;18:82–94. doi: 10.3991/ijoe.v18i06.29919. [DOI] [Google Scholar]
- 19.Mukati N., Namdev N., Dilip R., Hemalatha N., Dhiman V., Sahu B. Healthcare assistance to COVID-19 patient using internet of things (IoT) enabled technologies. Mater. Today Proc. p. 2021. in press. [DOI] [PMC free article] [PubMed]
- 20.Zhang C., Lu Y. Study on artificial intelligence: The state of the art and future prospects. J. Ind. Inf. Integr. 2021;23:100224. doi: 10.1016/j.jii.2021.100224. [DOI] [Google Scholar]
- 21.Greco L., Percannella G., Ritrovato P., Tortorella F., Vento M. Trends in IoT based solutions for health care: Moving AI to the edge. Pattern Recognit. Lett. 2020;135:346–353. doi: 10.1016/j.patrec.2020.05.016. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 22.Hameed K., Bajwa I.S., Ramzan S., Anwar W., Khan A. An intelligent IoT based healthcare system using fuzzy neural networks. Sci. Program. 2020;2020:8836927. doi: 10.1155/2020/8836927. [DOI] [Google Scholar]
- 23.Secinaro S., Calandra D., Secinaro A., Muthurangu V., Biancone P. The role of artificial intelligence in healthcare: A structured literature review. BMC Med. Inform. Decis. Mak. 2021;21:125. doi: 10.1186/s12911-021-01488-9. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 24.Awotunde J.B., Misra S. Illumination of Artificial Intelligence in Cybersecurity and Forensics. Springer International Publishing; Cham, Switzerland: 2022. Feature extraction and artificial intelligence-based intrusion detection model for a secure internet of things networks; pp. 21–44. [Google Scholar]
- 25.Puri V., Kataria A., Sharma V. Artificial intelligence-powered decentralized framework for Internet of Things in Healthcare 4.0. Trans. Emerg. Telecommun. Technol. 2021:e4245. doi: 10.1002/ett.4245. [DOI] [Google Scholar]
- 26.Othman S.B., Almalki F.A., Chakraborty C., Sakli H. Privacy-preserving aware data aggregation for IoT-based healthcare with green computing technologies. Comput. Electr. Eng. 2022;101:108025. doi: 10.1016/j.compeleceng.2022.108025. [DOI] [Google Scholar]
- 27.Rawat R., Mahor V., Garg B., Chouhan M., Pachlasiya K., Telang S. Lessons from COVID-19. Academic Press; Cambridge, MA, USA: 2022. Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID; pp. 405–425. [Google Scholar]
- 28.Sarosh P., Parah S.A., Bhat G.M. An efficient image encryption scheme for healthcare applications. Multimed. Tools Appl. 2022;81:7253–7270. doi: 10.1007/s11042-021-11812-0. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 29.Rani S., Chauhan M., Kataria A., Khang A. IoT equipped intelligent distributed framework for smart healthcare systems. arXiv. 20222110.04997 [Google Scholar]
- 30.Thilagam K., Beno A., Lakshmi M.V., Wilfred C.B., George S.M., Karthikeyan M., Peroumal V., Ramesh C., Karunakaran P. Secure IoT Healthcare Architecture with Deep Learning-Based Access Control System. J. Nanomater. 2022;2022:2638613. doi: 10.1155/2022/2638613. [DOI] [Google Scholar]
- 31.Ali A., Pasha M.F., Ali J., Fang O.H., Masud M., Jurcut A.D., Alzain M.A. Deep learning based homomorphic secure search-able encryption for keyword search in blockchain healthcare system: A novel approach to cryptography. Sensors. 2022;22:528. doi: 10.3390/s22020528. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 32.Kumar R., Kumar P., Tripathi R., Gupta G.P., Islam A.K.M.N., Shorfuzzaman M. Permissioned Blockchain and Deep Learning for Secure and Efficient Data Sharing in Industrial Healthcare Systems. IEEE Trans. Ind. Inform. 2022;18:8065–8073. doi: 10.1109/TII.2022.3161631. [DOI] [Google Scholar]
- 33.Kute S.S., Tyagi A.K., Aswathy S.U. Intelligent Interactive Multimedia Systems for E-Healthcare Applications. Springer; Singapore: 2022. Security, privacy and trust issues in internet of things and machine learning based e-healthcare; pp. 291–317. [Google Scholar]
- 34.Ali A., Almaiah M.A., Hajjej F., Pasha M.F., Fang O.H., Khan R., Teo J., Zakarya M. An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors. 2022;22:572. doi: 10.3390/s22020572. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 35.Anuradha M., Jayasankar T., Prakash N., Sikkandar M.Y., Hemalakshmi G., Bharatiraja C., Britto A.S.F. IoT enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess. Microsyst. 2021;80:103301. doi: 10.1016/j.micpro.2020.103301. [DOI] [Google Scholar]
- 36.Satyanarayana T.V.V., Roopa Y.M., Maheswari M., Patil M.B., Tamrakar A.K., Shankar B.P. A secured IoT-based model for human health through sensor data. Meas. Sens. 2022;24:100516. doi: 10.1016/j.measen.2022.100516. [DOI] [Google Scholar]
- 37.Zulkifl Z., Khan F., Tahir S., Afzal M., Iqbal W., Rehman A., Saeed S., Almuhaideb A.M. FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs. IEEE Access. 2022;10:15644–15656. doi: 10.1109/ACCESS.2022.3149046. [DOI] [Google Scholar]
- 38.Das S., Namasudra S. Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare. Trans. Emerg. Telecommun. Technol. 2023:e4716. doi: 10.1002/ett.4716. [DOI] [Google Scholar]
- 39.Jemal J.M. Managing Inventory: A Study of Databases and Database Management Systems. The College of Wooster; Wooster, OH, USA: 2020. Senior Independent Study Theses, Paper 9044. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
The datasets that were used in this study are available online on the following link IoT Healthcare Security Dataset https://www.kaggle.com/datasets/faisalmalik/iot-healthcare-security-dataset accessed on 15 November 2022.