Author
Listed:
- Dhairya Jadav
(Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India)
- Nilesh Kumar Jadav
(Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India)
- Rajesh Gupta
(Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India)
- Sudeep Tanwar
(Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India)
- Osama Alfarraj
(Computer Science Department, Community College, King Saud University, Riyadh 11437, Saudi Arabia)
- Amr Tolba
(Computer Science Department, Community College, King Saud University, Riyadh 11437, Saudi Arabia)
- Maria Simona Raboaca
(Doctoral School, University Politehnica of Bucharest, Splaiul Independentei Street No. 313, 060042 Bucharest, Romania
National Research and Development Institute for Cryogenic and Isotopic Technologies—ICSI Rm. Vâlcea, Uzinei Street, No. 4, P.O. Box 7 Râureni, 240050 Râmnicu Vâlcea, Romania)
- Verdes Marina
(Faculty of Civil Engineering and Building Services, Department of Building Services, Technical University of Gheorghe Asachi, 700050 Iași, Romania)
Abstract
Over the last few decades, the healthcare industry has continuously grown, with hundreds of thousands of patients obtaining treatment remotely using smart devices. Data security becomes a prime concern with such a massive increase in the number of patients. Numerous attacks on healthcare data have recently been identified that can put the patient’s identity at stake. For example, the private data of millions of patients have been published online, posing a severe risk to patients’ data privacy. However, with the advent of Industry 4.0, medical practitioners can digitally assess the patient’s condition and administer prompt prescriptions. However, wearable devices are also vulnerable to numerous security threats, such as session hijacking, data manipulation, and spoofing attacks. Attackers can tamper with the patient’s wearable device and relays the tampered data to the concerned doctor. This can put the patient’s life at high risk. Since blockchain is a transparent and immutable decentralized system, it can be utilized for securely storing patient’s wearable data. Artificial Intelligence (AI), on the other hand, utilizes different machine learning techniques to classify malicious data from an oncoming stream of patient’s wearable data. An amalgamation of these two technologies would make the possibility of tampering the patient’s data extremely difficult. To mitigate the aforementioned issues, this paper proposes a blockchain and AI-envisioned secure and trusted framework (HEART). Here, Long-Short Term Model (LSTM) is used to classify wearable devices as malicious or non-malicious. Then, we design a smart contract that allows only of those patients’ data having a wearable device to be classified as non-malicious to the public blockchain network. This information is then accessible to all involved in the patient’s care. We then evaluate the HEART’s performance considering various evaluation metrics such as accuracy, recall, precision, scalability, and network latency. On the training and testing sets, the model achieves accuracies of 93% and 92.92%, respectively.
Suggested Citation
Dhairya Jadav & Nilesh Kumar Jadav & Rajesh Gupta & Sudeep Tanwar & Osama Alfarraj & Amr Tolba & Maria Simona Raboaca & Verdes Marina, 2023.
"A Trustworthy Healthcare Management Framework Using Amalgamation of AI and Blockchain Network,"
Mathematics, MDPI, vol. 11(3), pages 1-20, January.
Handle:
RePEc:gam:jmathe:v:11:y:2023:i:3:p:637-:d:1047862
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:3:p:637-:d:1047862. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.