Skip to main content
Log in

Blockchain Assisted Cloud Security and Privacy Preservation using Hybridized Encryption and Deep Learning Mechanism in IoT-Healthcare Application

  • Research
  • Published:
Journal of Grid Computing Aims and scope Submit manuscript

Abstract

The fundamental issue that happens in cloud computing is considered to be privacy when applying it in Ubiquitous healthcare systems, which rely on data aggregation and joint deep learning mechanisms between various parties. The users undergoing communication make the interaction between the cloud for performing the data exchange. The participants involved in the process are presented at different levels, and also their hope gets differ based on the interaction characteristics. However, it is highly challenging to build the basic platform for communication in the cloud environment. On the other hand, security solutions can be implemented to assuring the confidentiality of exchanging data. Therefore, in this proposed model, a secure outsourcing scheme using a deep learning framework is developed to provide cloud security and privacy preservation in the healthcare Internet of Things (IoT) environment. Different IoT devices are used for collecting the patient’s health data and storing it in the database. Initially, the medical data is garnered from the standard databases, and this is encrypted by using the Optimal Key-based Hybrid Elliptic Curve Cryptography with Fully Homomorphic Encryption (OK-HECCFHE). Here, the optimal key is generated using Hybrid Polar Bear-Ageist Spider Monkey Optimization (HPB-ASMO) algorithm. Then, the encrypted data is stored in the blockchain, and it gets decrypted by the appropriate user using the optimal key, and finally, the medical data prediction is done via the Optimized Deep Neural Network with a Gated Recurrent Unit (ODNN-GRU), where the parameters are optimized from the hybrid deep learning network to maximize the performance with the support of same HPB-ASMO. The experimental analysis is carried out to verify the performance of the developed model by using different evaluation metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Data Availability

The data underlying this article are available in Health Care Analytics database, at https://www.kaggle.com/datasets/abisheksudarshan/health-care-analytics: access date: 2023–04-10, and AV: Healthcare Analytics II, at https://www.kaggle.com/datasets/nehaprabhavalkar/av-healthcare-analytics-ii: access date: 2023–04-10.

References

  1. Bi, H., Liu, J., Kato, N.: Deep Learning-Based Privacy Preservation and Data Analytics for IoT Enabled Healthcare. IEEE Trans. Industr. Inf. 18(7), 4798–4807 (2022)

    Article  Google Scholar 

  2. Alkadi, O, Moustafa, N., Turnbull, B., Choo K. -K. R.: A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks. IEEE Internet Things J. 8(12), 9463–9472 (2021)

  3. Pamarthi, Satyanarayana, Narmadha, R.: Adaptive Key Management-Based Cryptographic Algorithm for Privacy Preservation in Wireless Mobile Adhoc Networks for IoT Applications. Wirel. Pers. Commun. 124, 349–376 (2022)

  4. Abirami, P., Vijay Bhanu, S.: Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment. Soft Comput. 24, 18927–18936 (2020)

  5. Sudhakar, Rayapati Venkata, Malleswara Rao, T. Ch.: Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications. Cluster Comput. 23, 2579–2589 (2020)

  6. Ma, K., Liang, H., Wu, K.: Homomorphic Property-Based Concurrent Error Detection of RSA: A Countermeasure to Fault Attack. IEEE Trans. Comput. 61(7), 1040–1049 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  7. Singh, Anuj Kumar, Nayyar, Anand, Garg, Ankit.: A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud. Multimed. Tools Applic. 82(15), 1–52 (2022).

  8. Liao, D., Sun, G., Li, H., Hongfang, Yu., Chang, V.: The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems. Clust. Comput. 20, 2283–2297 (2017)

    Article  Google Scholar 

  9. Sarala, V., Shanmugapriya, P.: DLFPM-SSO-PE: privacy-preserving and security of intermediate data in cloud storage. Distrib. Parallel Databases 40, 815–833 (2022)

    Article  Google Scholar 

  10. Sathya, A., Kanaga Suba Raja, S.: Privacy Preservation-Based Access Control Intelligence for Cloud Data Storage in Smart Healthcare Infrastructure. Wirel. Pers. Commun. 118, 3595–3614 (2021).

  11. AtifMoqurrab, Syed, Tariq, Noshina, Anjum, Adeel, Asheralieva, Alia, Malik, Saif U. R., Malik, Hassan, Pervaiz, Haris, Singh Gill, Sukhpal: A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing. Wirel. Pers. Commun. 126, 2379–2401 (2022).

  12. Ranjith, J., Mahantesh, K.: Blockchain-based Knapsack System for Security and Privacy Preserving to Medical Data. SN Comput. Science 2, 245 (2021).

  13. Subramanian, E. K., Tamilselvan, Latha: Elliptic curve Diffie–Hellman cryptosystem in big data cloud security. Clust. Comput. 23, 3057–3067 (2020).

  14. Senthilkumar, G., Tamilarasi, K., Kaviarasan, S., Arun, M.: Trusty authentication of devices using blockchain-cloud of things (B-CoT) for fulfilling commercial services. Int. J. Syst. Assur. Eng. Manag. (2022).

  15. Shukla, S., Patel, S.J.: A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing. Computing 104, 1173–1202 (2022)

    Article  MathSciNet  MATH  Google Scholar 

  16. Nagesh, Puvvada, Srinivasu, N.: Modelling a secure framework for data verification and integrity in cloud environment. Int. J. Syst. Assur. Eng. Manag. (2022).

  17. Ghorbel, Amal, Ghorbel, Mahmoud, Jmaiel, Mohamed: Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain. Int. J. Inf. Secur. 21, 489–508 (2022).

  18. Zhao, Q., Chen, S., Liu, Z., Baker, T., Zhang, Y.: Blockchain-based privacy-preserving remote data integritychecking scheme for IoT information systems. Inf. Process. Manage. 57, 102355 (2020)

    Article  Google Scholar 

  19. vv, K. L.: Blockchain-based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment. Appl. Intell. 53, 4733–4747 (2022) 

  20. Shalini, K.S., Nithya, M.: An integrated approach of block chain technology with machine learning and cloud computing for handling healthcare data. Int. J. Health Sci. 6, 7180–7190 (2022)

    Google Scholar 

  21. Grover, Bharti, Kushwaha, Dileep Kumar: Authorization and privacy preservation in cloud-based distributed ehr system using blockchain technology and anonymous digital ring signature. Health Serv. Outcomes Res. Methodol. 23, 227–240 (2022).

  22. Mustafa, M., Alshare, M., Bhargava, D., Neware, R., Singh, B., Ngulube, P.: Perceived Security Risk Based on Moderating Factors forBlockchain Technology Applications in Cloud Storage to AchieveSecure Healthcare Systems. Comput. Math. Methods Med. 6112815, 10 (2022)

    Google Scholar 

  23. Kwabena, O.-A., Qin, Z., Zhuang, T., Qin, Z.: MSCryptoNet: Multi-Scheme privacy-preserving deep learning in cloud computing. IEEE Access 1–1 7, 29344–29354 (2019).

  24. Abirami, P., Bhanu, S. Vijay: Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment. Soft Comput. 24, 18927–18936 (2020).

  25. Xu, M., Zou, Z., Cheng, Y., Hu, Q., Yu, D., Cheng, X.: SPDL: A Blockchain-enabled Secure and Privacy-preserving Decentralized Learning System. IEEE Trans. Comput. 11 (2022).

  26. Song, Y., Park, S., Sullivan, M.B., Kim, J.: SEC-BADAEC: An Efficient ECC With No Vacancy for Strong Memory Protection. IEEE Access 10, 89769–89780 (2022)

    Article  Google Scholar 

  27. Yang, Y., Zhang, S., Yang, J., Li, J., Li, Z.: Targeted fully homomorphic encryption based on a Double Decryption Algorithm for polynomials. Tsinghua Sci. Technol. 19(5), 478–485 (2014)

    Article  MathSciNet  Google Scholar 

  28. Połap, Dawid, Woz´niak, Marcin: Polar Bear Optimization Algorithm: Meta-Heuristic with Fast Population Movement and Dynamic Birth and Death Mechanism. Symmetry 9, 203 (2017)

  29. Sharma, A., Sharma, A., Panigrahi, B.K., Kiran, D., Kumar, R.: Ageist Spider Monkey Optimization algorithm. Swarm Evol. Comput. 28, 58–77 (2016)

    Article  Google Scholar 

  30. Jin, Q., Xue, X., Peng, W., Cai, W., Zhang, Y., Zhang, L.: TBLC-rAttention: A Deep Neural Network Model for Recognizing the Emotional Tendency of Chinese Medical Comment. IEEE Access 8, 96811–96828 (2020)

    Article  Google Scholar 

  31. Chen, C.-J., Chou, F.-I., Chou, J.-H.: Temperature Prediction for Reheating Furnace by Gated Recurrent Unit Approach. IEEE Access 10, 33362–33369 (2022)

    Article  Google Scholar 

  32. Seo, J.-H., Im, C.-H., Kwak, S.-Y., Lee, C.-G., Jung, H.-K.: An Improved Particle Swarm Optimization Algorithm Mimicking Territorial Dispute Between Groups for Multimodal Function Optimization Problems. IEEE Trans. Magn. 44(6), 1046–1049 (2008)

    Article  Google Scholar 

  33. Motamarri, R., Bhookya, N.: JAYA Algorithm Based on Lévy Flight for Global MPPT Under Partial Shading in Photovoltaic System. IEEE J. Emerg. Sel. Top. Power Electron. 9(4), 4979–4991 (2021)

    Article  Google Scholar 

  34. Equihua, C., et al.: A low-cost and highly compact FPGA-based encryption/decryption architecture for AES algorithm. IEEE Lat. Am. Trans. 19(9), 1443–1450 (2021)

    Article  Google Scholar 

  35. Lee, G.S., Kim, S., Bae, S.: Efficient Design Method for a Forward-Converter Transformer Based on a KNN–GRU–DNN Model. IEEE Trans. Power Electron. 38(1), 73–78 (2023)

    Article  Google Scholar 

  36. Huang, X., Wang, W.: A Novel and Efficient Design for an RSA Cryptosystem With a Very Large Key Size. IEEE Trans. Circuits Syst. II Express Briefs 62(10), 972–976 (2015)

    Google Scholar 

  37. Tang, H., Sun, Q.T., Yang, X., Long, K.: A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense. IEEE Access 6, 26059–26068 (2018)

    Article  Google Scholar 

  38. Almaiah, Mohammed Amin, Ali, Aitizaz, Hajjej, Fahima, Pasha, Muhammad Fermi, Alohali, Manal Abdullah: A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things. Sensors 22(6), 2112 (2022)

  39. Almaiah, Mohammed Amin, Hajjej, Fahima, Ali, Aitizaz, Pasha, Muhammad Fermi, Almomani, Omar: A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS. Sensors 22(4), 1448 (2022)

  40. Almaiah, Mohammed Amin, Hajjej, Fahima, Ali, Aitizaz, Pasha, Muhammad Fermi, Almomani, Omar: An AI‐Enabled Hybrid Lightweight Authentication Model for Digital Healthcare Using Industrial Internet of Things Cyber‐Physical Systems. Sensors 22, 1448 (2022).

  41. Ali, Aitizaz, Pasha, Muhammad Fermi, Ali, Jehad, Fang, Ong Huey, Masud, Mehedi, Jurcut, Anca Delia, Alzain, Mohammed A.: Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography. Sensors 22(2), 528 (2022)

  42. Ali, Aitizaz, Almaiah, Mohammed Amin, Hajjej, Pasha, Muhammad Fermi, Fang, Ong Huey, Khan, Rahim, Teo, Jason, Zakarya, Muhammad: An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. Sensors 22(2), 572 (2022)

  43. Wang, Weizheng, Xu, Hao, Alazab, Mamoun, Gadekallu, Thippa Reddy, Han, Zhaoyang, Su, Chunhua: Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices. IEEE Trans. Ind. Inf. 18(10), 7059-7067 (2021)

  44. Wang, Weizheng, Chen, Qiu, Yin, Zhimeng, Srivastava, Gautam, Gadekallu, Thippa Reddy, Su, Fawaz Alsolami Chunhua: Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks. IEEE Internet Things J. 9(11), 8883-8891 (2021)

  45. Lian, Zhuotao, Wang, Weizheng, Han, Zhaoyang, Su, Chunhua: Blockchain-Based Personalized Federated Learning for Internet of Medical Things. IEEE Trans. Sustain. Comput. (Early Access) 1–9 (2023)

  46. Wang, Weizheng, Huang, Huakun, Yin, Zhimeng, Gadekallu, Thippa Reddy, Alazab, Mamoun, Su, Chunhua: Smart contract token-based privacy-preserving access control system for industrial Internet of Things. Digit. Commun. Netw. 9(2), 337-346 (2023)

  47. Escorcia-Gutierrez, José, Mansour, Romany F., Leal, Esmeide, Villanueva, Jair, Jimenez-Cabas, Javier, Soto, Carlos, Soto-Díaz, Roosvel: Privacy Preserving Blockchain with Energy Aware Clustering Scheme for IoT Healthcare Systems. Mob. Netw. Applic. (2023)

  48. Lakhan, Abdullah, Mohammed, Mazin Abed, Nedoma, Jan, Senior Member, Martinek, Radek, Senior Membe, Tiwari, Prayag, Member, Vidyarthi, Ankit, Alkhayyat, Ahmed, Wang, Weiyu: Federated-Learning Based Privacy Preservation and Fraud-Enabled Blockchain IoMT System for Healthcare. IEEE J. Biomed. Health Inf. 27(2) (2023).

  49. Trivedi, H.S., Patel, S.J.: Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems. Internet Things 22, 100693 (2023)

    Article  Google Scholar 

Download references

Acknowledgements

I would like to express my very great appreciation to the co-authors of this manuscript for their valuable and constructive suggestions during the planning and development of this research work

Author information

Authors and Affiliations

Authors

Contributions

All authors have made substantial contributions to conception and design, revising the manuscript, and the final approval of the version to be published. Also, all authors agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.

Corresponding author

Correspondence to K. Raju.

Ethics declarations

Ethics Approval and Consent to Participate

Not Applicable.

Consent for Publication

Not Applicable.

Competing Interests

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raju, K., Ramshankar, N., Shathik, J.A. et al. Blockchain Assisted Cloud Security and Privacy Preservation using Hybridized Encryption and Deep Learning Mechanism in IoT-Healthcare Application. J Grid Computing 21, 45 (2023). https://doi.org/10.1007/s10723-023-09678-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10723-023-09678-7

Keywords

Navigation