Skip to main content
Log in

E-healthcare application cyber security analysis using quantum machine learning in malicious user detection

  • Published:
Optical and Quantum Electronics Aims and scope Submit manuscript

Abstract

In the medical field, it is crucial to manage visual and auditory data generated by Internet of Things (IoT) devices. Cloud servers are often used to manage the massive amounts of data generated by these IoT devices. Current improvements in electronic and communication technology have greatly impacted the e-healthcare sector owing to the effective exchange of patient data. IoMTs, or the Internet of Medical Things, are a relatively recent development in the field of remote health monitoring. They are used in patient-centric systems for the transmission and tracking of patient data. Authentication and anomaly detection are two areas where modern medical systems make extensive use of encryption, biometrics, and machine learning (ML) technology. This study suggests a new method for assessing the cyber security of e-healthcare apps; one that makes use of quantum machine learning. Users of e-healthcare applications have been tracked and analysed to identify risky behaviours. A deep variational adversarial encoder network and a fuzzy Gaussian quantile neural network classify the characteristics of observed user activity data, leading to the identification of malicious users and an increase in network security. Recreation aftereffects of the proposed engineering show vigor with regards to proficient execution, including prescient misfortune = 7%, learning rate = goldilocks (0.5), record advancement = 23%, transmission influence = − 18 dBm, jitter = 32 ms, delay = 90 ms, throughput = 170 bytes, obligation cycle and conveyance = 10%, and dynamic serverless reactions. Proposed technique attained Random accuracy of 98%, F-1 Score of 75%, mean average Precision (mAP) of 65%, Specificity of 66%, kappa Co-efficient of 69%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Availability of data and materials

All the data’s available in the manuscript.

References

  • Akshay K, M., Samiayya, D., Vincent, P.M., Srinivasan, K., Chang, C.Y., Ganesh, H.: A hybrid framework for intrusion detection in healthcare systems using deep learning. Front. Public Health , 9, 824898 (2022), https://doi.org/10.3389/fpubh.2021.824898

    Article  PubMed  PubMed Central  Google Scholar 

  • Anand, A., Rani, S., Anand, D., Aljahdali, H. M., Kerr, D.: An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNNDMA) in 5G-IoT Healthcare Applications. Sensors. 21, 19: 6346 (2021), https://doi.org/10.3390/s21196346

    Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 

  • Das, S., Das, J., Modak, S., Mazumdar, K.: Internet of things with machine learning-based smart cardiovascular disease classifier for healthcare in secure platform. In: Internet of Things and Data Mining for Modern Engineering and Healthcare Applications, pp. 45–64. Chapman and Hall/CRC (2022)

  • Dhasarathan, C., Shanmugam, M., Kumar, M., Tripathi, D., Khapre, S., Shankar, A.: A nomadic multi-agent based privacy metrics for e-health care: a deep learning approach. Multimed. Tools Appl. 1–24 (2023)

  • Khan, A.A., Laghari, A.A., Shafiq, M., Cheikhrouhou, O., Alhakami, W., Hamam, H., Shaikh, Z.A.: Healthcare ledger management: a blockchain and machine learning-enabled novel and secure architecture for the medical industry. Hum. Cent. Comput. Inf. Sci 12, 55 (2022), https://doi.org/10.22967/HCIS.2022.12.055

    Google Scholar 

  • Kilincer, I.F., Ertam, F., Sengur, A., Tan, R.S., Acharya, U.R.: Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization. Biocybern. Biomed. Eng. 43(1), 30–41 (2023)

    Article  Google Scholar 

  • Kishor, A., Jeberson, W.: Diagnosis of heart disease using internet of things and machine learning algorithms. In: Proceedings of Second International Conference on Computing, Communications, and Cyber-Security: IC4S 2020, pp. 691–702. Springer Singapore (2021)

  • Kishor, A., Chakraborty, C., Jeberson, W. (2021). A novel fog computing approach for minimization of latency in healthcare using machine learning

  • Kumar, S., Srivastava, S., Mongia, S., Amsa, M.: Diagnosis of heart disease using machine learning classification technique in e-healthcare. J. Pharm. Negat. Results, 656–664 (2023)

  • Kute, S.S., Tyagi, A.K., Aswathy, S.U.: Security, privacy and trust issues in internet of things and machine learning based e-healthcare. Intell. Interact. Multimed. Syst. e-Healthc. Appl. 291–317 (2022)

  • Maseleno, A., Hashim, W., Perumal, E., Ilayaraja, M., Shankar, K.: Access control and classifier-based blockchain technology in e-healthcare applications. In: Intelligent Data Security Solutions for e-Health Applications, pp. 151–167. Academic Press (2020)

    Chapter  Google Scholar 

  • Sengan, S., Khalaf, O.I., Sharma, D.K., Hamad, A.A.: Secured and privacy-based IDS for healthcare systems on E-medical data using machine learning approach. Int. J. Reliab. Qual. E-Healthc. (IJRQEH) 11(3), 1–11 (2022a)

    Google Scholar 

  • Sengan, S., Khalaf, O.I., Rao, G.R.K., Sharma, D.K., Amarendra, K., Hamad, A.A.: Security-aware routing on wireless communication for E-health records monitoring using machine learning. Int. J. Reliab. Qual. E-Healthc. (IJRQEH) 11(3), 1–10 (2022b)

    Google Scholar 

  • Tenepalli, D., Thandava Meganathan, N.: A review on machine learning and blockchain technology in E-healthcare. In: International Conference on Intelligent Systems Design and Applications, pp. 338–349. Springer Nature Switzerland, Cham (2022)

    Google Scholar 

  • Unal, D., Bennbaia, S., Catak, F.O.: Machine learning for the security of healthcare systems based on Internet of Things and edge computing. In: Cybersecurity and Cognitive Science, pp. 299–320. Academic Press (2022)

    Chapter  Google Scholar 

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Contributions

ZL Conceived and design the analysis ☒Writing—Original draft preparation. Collecting the Data, XJ☒ Contributed data and analysis stools Performed and analysis, Performed and analysis BL Wrote the Paper ☒ Editing and Figure Design.

Corresponding author

Correspondence to Bin Li.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethical approval

This article does not contain any studies with animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Z., Jia, X. & Li, B. E-healthcare application cyber security analysis using quantum machine learning in malicious user detection. Opt Quant Electron 56, 476 (2024). https://doi.org/10.1007/s11082-023-05854-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11082-023-05854-x

Keywords

Navigation