Blockchain-Enabled Secure Healthcare Data Management with Modified Gazelle Optimization and DLT-Trained RNN-BILSTM Approach

Authors

  • Rolly Saxena Department of Computer Applications, Medi-Caps University, Indore, Madhya Pradesh, India
  • Srinivasa Rao D Department of Computer Science and Engineering, Medi-Caps University, Indore, Madhya Pradesh, India

DOI:

https://doi.org/10.15575/join.v10i2.1638

Keywords:

Blockchain, Healthcare data, Modified Gazelle Optimization, Distributed Ledger Technology, RNN-BILSTM based IDS

Abstract

The growth of the healthcare system has posed challenges in safeguarding patient privacy amidst the storage, distribution and management of medical data. Blockchain (BC) offers a promising result by securely enabling the exchange of medical information. Utilizing block chain technology ensures the security of individuals' confidential health information.  The use of a decentralized, immutable ledger using blockchain technology provides a secure, impenetrable platform for storing and retrieving private medical information, protecting patient privacy.   The application of Modified Gazelle Optimization enables the determination of the shortest path for efficient data transfers within the block chain network. By adopting a specialized routing protocol called Modified Gazelle Optimized Routing, this approach minimizes latency and maximizes throughput, facilitating continuous and expedited transfer of health data across the network. To assure the data confidentiality and integrity of network nodes, a Distributed Ledger Technology (DLT) trained Recurrent Neural Network with Bidirectional Long Short Term Memory (RNN-BILSTM) approach is implemented. This advanced Deep Learning (DL) technique enhances the security and reliability of the network by detecting and preventing unauthorized access and tampering attempts. The proposed RNN-BILSTM based Intrusion Detection System (IDS) efficiently detects different types of attacks with high accuracy. By analyzing network traffic and patterns in real-time, the IDS have the ability to identify and mitigate harmful Internet of Things (IoT) requests and various stealthy attack types, including previously unknown threats. The outcomes of this research prove an efficacy and consistency of the proposed strategy in enhancing the security, efficiency and performance matrix with an accuracy of 97% and comparative analysis is done with traditional methods, thereby ensuring an availability and integrity of healthcare data.

References

[1] A. A. Abdellatif, A. Z. Al-Marridi, A. Mohamed, A. Erbad, C. F. Chiasserini and A. Refaey, “ssHealth: toward secure, blockchain-enabled healthcare systems,” IEEE Network, vol. 34, no. 4, pp. 312-319, April 2020, doi: https://doi.org/10.1109/MNET.011.1900553.

[2] A. Ali, H. Ali, A. Saeed, A. A. Khan, T. T. Tin, M. Assam, Y. Y. Ghadi and H. G. Mohamed, “Blockchain-Powered Healthcare Systems: Enhancing Scalability and Security with Hybrid Deep Learning,” Sensors, vol. 23, no. 18, pp. 7740, September 2023, doi: https://doi.org/10.3390/s23187740.

[3] M. Younis, W. Lalouani, N. Lasla, L. Emokpae and M. Abdallah “Blockchain-enabled and data-driven smart healthcare solution for secure and privacy-preserving data access,” IEEE Systems Journal, vol. 16, no. 3, pp. 3746-3757, July 2021, doi: https://doi.org/10.1109/JSYST.2021.3092519.

[4] K. Azbeg, O. Ouchetto and S. J. Andaloussi, “BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security,” Egyptian informatics journal, vol. 23, no. 2, pp. 329-343, July 2022, doi: https://doi.org/10.1016/j.eij.2022.02.004.

[5] R. Bhan, R. Pamula, P. Faruki and J. Gajrani, “Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network,” The Journal of Supercomputing, vol. 79, no. 14, pp. 16233-16274, September 2023, doi: https://doi.org/10.1007/s11227-023-05272-6.

[6] S. Tatineni, “Integrating Ai, Blockchain and Cloud Technologies for Data Management in Healthcare,” Journal of Computer Engineering and Technology (JCET), vol. 5, no. 01, January 2022.

[7] R. G. Sonkamble, A. M. Bongale, S. Phansalkar, A. Sharma and S. Rajput, “Secure data transmission of electronic health records using blockchain technology,” Electronics, vol. 12, no. 4, pp. 1015, February 2023, doi: https://doi.org/10.3390/electronics12041015.

[8] M. S. Islam, M. A. Bin Ameedeen, M. A. Rahman, H. Ajra and Z. B. Ismail “Healthcare-chain: blockchain-enabled decentralized trustworthy system in healthcare management industry 4.0 with cyber safeguard,” Computers, vol. 12, no. 2, pp. 46, February 2023, doi: https://doi.org/10.3390/computers12020046.

[9] N. Sammeta and L. Parthiban “Hyperledger blockchain enabled secure medical record management with deep learning-based diagnosis model,” Complex & Intelligent Systems, vol. 8, no. 1, pp. 625-640, February 2022, doi: https://doi.org/10.1007/s40747-021-00549-w.

[10] E. P. Adeghe, C. A. Okolo, and O. T. Ojeyinka, “Evaluating the impact of blockchain technology in healthcare data management: A review of security, privacy, and patient outcomes,” vol. 10, no. 2, pp. 013-20, May 2024, doi: https://doi.org/10.53022/oarjst.2024.10.2.0044.

[11] A. A. Khan, A. A. Laghari, M. Shafiq, O. Cheikhrouhou, W. Alhakami, H. Hamam, and Z. A. Shaikh “Healthcare ledger management: A blockchain and machine learning-enabled novel and secure architecture for medical industry,” Hum. Cent. Comput. Inf. Sci, vol. 12, pp. 55, November 2022, doi: https://doi.org/10.22967/HCIS.2022.12.055.

[12] A. A. Bahattab, A. Trad, and H. Youssef, “PEERP: A priority-based energy-efficient routing protocol for reliable data transmission in healthcare using the IoT,” Procedia Computer Science, vol. 175, pp. 373-378, January 2020, doi: https://doi.org/10.1016/j.procs.2020.07.053.

[13] N. Ahmad, M. D. Awan, M. S. Hayat Khiyal, M. I. Babar, A. Abdelmaboud, H. A. Ibrahim, and N. O. Hamed, “Improved QoS aware routing protocol (IM-QRP) for WBAN based healthcare monitoring system,” IEEE Access, vol.10, pp.121864-121885, November 2022, doi: https://doi.org/10.1109/ACCESS.2022.3223085.

[14] F. A. Almalki, S. Ben Othman, F. A. Almalki, and H. Sakli, “EERP-DPM: Energy efficient routing protocol using dual prediction model for healthcare using IoT,” Journal of Healthcare Engineering, vol. 2021, pp. 1-15, May 2021, doi: https://doi.org/10.1155/2021/9988038.

[15] E. Refaee, S. Parveen, K. M. J. Begum, F. Parveen, M. C. Raja, S. K. Gupta, and S. Krishnan, “Secure and scalable healthcare data transmission in IoT based on optimized routing protocols for mobile computing applications,” Wireless Communications and Mobile Computing. pp. 1-12, June 2022, doi: https://doi.org/10.1155/2022/5665408.

[16] R. Singla, N. Kaur, D. Koundal, S. A. Lashari, S. Bhatia, and M. K. I. Rahmani, “Optimized energy efficient secure routing protocol for wireless body area network,” IEEE Access, vol. 9, pp. 116745-116759, August 2021, doi: https://doi.org/10.1109/ACCESS.2021.3105600.

[17] A. B. Tello, J. Xing, A. L. Patil, L. P. Patil, and S. Sayyad, “Blockchain Technologies in Healthcare System for Real Time Applications Using IoT and Deep Learning Techniques,” International Journal of Communication Networks and Information Security, vol. 14, no. 3, pp. 257-268, December 2022.

[18] V. Saravanan, M. Madiajagan, S. M. Rafee, P. Sanju, T. B. Rehman, and B. Pattanaik, “IoT-based blockchain intrusion detection using optimized recurrent neural network,” Multimedia Tools and Applications, vol. 83, no. 11, pp. 31505-31526, March 2024, doi: https://doi.org/10.1007/s11042-023-16662-6.

[19] P. Kumar, R. Kumar, G. P. Gupta, R. Tripathi, A. Jolfaei, and A. N. Islam, “A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system,” Journal of Parallel and Distributed Computing, vol. 172, pp. 69-83, February 2023, doi: https://doi.org/10.1016/j.jpdc.2022.10.002.

[20] S. Rahmadika, P. V. Astillo, G. Choudhary, D. G. Duguma, V. Sharma, and I. You, “Blockchain-based privacy preservation scheme for misbehavior detection in lightweight IoMT devices,” IEEE Journal of Biomedical and Health Informatics, vol. 27, no. 2, pp. 710-721, June 2022, doi: https://doi.org/10.1109/JBHI.2022.3187037.

[21] T. S. Pooja, and P. Shrinivasacharya, “Evaluating neural networks using Bi-Directional LSTM for network IDS (intrusion detection systems) in cyber security,” Global Transitions Proceedings, vol. 2, no. 2, pp. 448-454, November 2021, doi: https://doi.org/10.1016/j.gltp.2021.08.017.

[22] A. Aldallal, “Toward efficient intrusion detection system using hybrid deep learning approach,” Symmetry, vol. 14, no. 9, pp. 1916, September 2022, doi: https://doi.org/10.3390/sym14091916.

[23] P. Qi, D. Chiaro, F. Giampaolo, and F. Piccialli, “A blockchain-based secure Internet of medical things framework for stress detection,” Information Sciences, vol. 628, pp. 377-390, May 2023, doi: https://doi.org/10.3390/sym14091916.

[24] S. K. Somayaji, M. Alazab, M. K. Manoj, A. Bucchiarone, C. L. Chowdhary, and T. R. Gadekallu “A framework for prediction and storage of battery life in IoT devices using DNN and blockchain,” In 2020 IEEE Globecom Workshops (GC Wkshps), pp. 1-6, December 2020, doi: https://doi.org/10.1109/GCWkshps50303.2020.9367413.

[25] H. Singh, Z. Ahmed, M. D. Khare, and J. Bhuvana, “An IoT and blockchain-based secure medical care framework using deep learning and nature-inspired algorithms,” International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 8s, pp. 183-191, July 2023.

[26] B. Jaishankar, S. Vishwakarma, P. Mohan, A. K. S. Pundir, I. Patel, and N. Arulkumar, “Blockchain for securing healthcare data using squirrel search optimization algorithm,” Intelligent Automation & Soft Computing, vol. 32, no. 3, pp. 1815-1829, January 2022, doi: http://dx.doi.org/10.32604/iasc.2022.021822.

[27] W. Dai, X. Li, W. Ji, and S. He, “Network intrusion detection method based on CNN, BiLSTM, and attention mechanism,” IEEE Access, vol. 12, pp. 53099 - 53111, April 2024, doi: https://doi.org/10.1109/ACCESS.2024.3384528.

[28] D. Wu, L. Wu, T. Wen, and L. Li, “Microgrid operation optimization method considering power-to-gas equipment: An improved gazelle optimization algorithm,” Symmetry, vol. 16, no. 1, pp. 83, January 2024, doi: https://doi.org/10.3390/sym1601

Downloads

Published

2025-11-08

Issue

Section

Article

Citation Check

Similar Articles

<< < 11 12 13 14 15 16 17 18 19 20 > >> 

You may also start an advanced similarity search for this article.