Blockchain-Enabled Secure Healthcare Data Management with Modified Gazelle Optimization and DLT-Trained RNN-BILSTM Approach
DOI:
https://doi.org/10.15575/join.v10i2.1638Keywords:
Blockchain, Healthcare data, Modified Gazelle Optimization, Distributed Ledger Technology, RNN-BILSTM based IDSAbstract
References
[1] A. A. Abdellatif, A. Z. Al-Marridi, A. Mohamed, A. Erbad, C. F. Chiasserini and A. Refaey, “ssHealth: toward secure, blockchain-enabled healthcare systems,” IEEE Network, vol. 34, no. 4, pp. 312-319, April 2020, doi: https://doi.org/10.1109/MNET.011.1900553.
[2] A. Ali, H. Ali, A. Saeed, A. A. Khan, T. T. Tin, M. Assam, Y. Y. Ghadi and H. G. Mohamed, “Blockchain-Powered Healthcare Systems: Enhancing Scalability and Security with Hybrid Deep Learning,” Sensors, vol. 23, no. 18, pp. 7740, September 2023, doi: https://doi.org/10.3390/s23187740.
[3] M. Younis, W. Lalouani, N. Lasla, L. Emokpae and M. Abdallah “Blockchain-enabled and data-driven smart healthcare solution for secure and privacy-preserving data access,” IEEE Systems Journal, vol. 16, no. 3, pp. 3746-3757, July 2021, doi: https://doi.org/10.1109/JSYST.2021.3092519.
[4] K. Azbeg, O. Ouchetto and S. J. Andaloussi, “BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security,” Egyptian informatics journal, vol. 23, no. 2, pp. 329-343, July 2022, doi: https://doi.org/10.1016/j.eij.2022.02.004.
[5] R. Bhan, R. Pamula, P. Faruki and J. Gajrani, “Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network,” The Journal of Supercomputing, vol. 79, no. 14, pp. 16233-16274, September 2023, doi: https://doi.org/10.1007/s11227-023-05272-6.
[6] S. Tatineni, “Integrating Ai, Blockchain and Cloud Technologies for Data Management in Healthcare,” Journal of Computer Engineering and Technology (JCET), vol. 5, no. 01, January 2022.
[7] R. G. Sonkamble, A. M. Bongale, S. Phansalkar, A. Sharma and S. Rajput, “Secure data transmission of electronic health records using blockchain technology,” Electronics, vol. 12, no. 4, pp. 1015, February 2023, doi: https://doi.org/10.3390/electronics12041015.
[8] M. S. Islam, M. A. Bin Ameedeen, M. A. Rahman, H. Ajra and Z. B. Ismail “Healthcare-chain: blockchain-enabled decentralized trustworthy system in healthcare management industry 4.0 with cyber safeguard,” Computers, vol. 12, no. 2, pp. 46, February 2023, doi: https://doi.org/10.3390/computers12020046.
[9] N. Sammeta and L. Parthiban “Hyperledger blockchain enabled secure medical record management with deep learning-based diagnosis model,” Complex & Intelligent Systems, vol. 8, no. 1, pp. 625-640, February 2022, doi: https://doi.org/10.1007/s40747-021-00549-w.
[10] E. P. Adeghe, C. A. Okolo, and O. T. Ojeyinka, “Evaluating the impact of blockchain technology in healthcare data management: A review of security, privacy, and patient outcomes,” vol. 10, no. 2, pp. 013-20, May 2024, doi: https://doi.org/10.53022/oarjst.2024.10.2.0044.
[11] A. A. Khan, A. A. Laghari, M. Shafiq, O. Cheikhrouhou, W. Alhakami, H. Hamam, and Z. A. Shaikh “Healthcare ledger management: A blockchain and machine learning-enabled novel and secure architecture for medical industry,” Hum. Cent. Comput. Inf. Sci, vol. 12, pp. 55, November 2022, doi: https://doi.org/10.22967/HCIS.2022.12.055.
[12] A. A. Bahattab, A. Trad, and H. Youssef, “PEERP: A priority-based energy-efficient routing protocol for reliable data transmission in healthcare using the IoT,” Procedia Computer Science, vol. 175, pp. 373-378, January 2020, doi: https://doi.org/10.1016/j.procs.2020.07.053.
[13] N. Ahmad, M. D. Awan, M. S. Hayat Khiyal, M. I. Babar, A. Abdelmaboud, H. A. Ibrahim, and N. O. Hamed, “Improved QoS aware routing protocol (IM-QRP) for WBAN based healthcare monitoring system,” IEEE Access, vol.10, pp.121864-121885, November 2022, doi: https://doi.org/10.1109/ACCESS.2022.3223085.
[14] F. A. Almalki, S. Ben Othman, F. A. Almalki, and H. Sakli, “EERP-DPM: Energy efficient routing protocol using dual prediction model for healthcare using IoT,” Journal of Healthcare Engineering, vol. 2021, pp. 1-15, May 2021, doi: https://doi.org/10.1155/2021/9988038.
[15] E. Refaee, S. Parveen, K. M. J. Begum, F. Parveen, M. C. Raja, S. K. Gupta, and S. Krishnan, “Secure and scalable healthcare data transmission in IoT based on optimized routing protocols for mobile computing applications,” Wireless Communications and Mobile Computing. pp. 1-12, June 2022, doi: https://doi.org/10.1155/2022/5665408.
[16] R. Singla, N. Kaur, D. Koundal, S. A. Lashari, S. Bhatia, and M. K. I. Rahmani, “Optimized energy efficient secure routing protocol for wireless body area network,” IEEE Access, vol. 9, pp. 116745-116759, August 2021, doi: https://doi.org/10.1109/ACCESS.2021.3105600.
[17] A. B. Tello, J. Xing, A. L. Patil, L. P. Patil, and S. Sayyad, “Blockchain Technologies in Healthcare System for Real Time Applications Using IoT and Deep Learning Techniques,” International Journal of Communication Networks and Information Security, vol. 14, no. 3, pp. 257-268, December 2022.
[18] V. Saravanan, M. Madiajagan, S. M. Rafee, P. Sanju, T. B. Rehman, and B. Pattanaik, “IoT-based blockchain intrusion detection using optimized recurrent neural network,” Multimedia Tools and Applications, vol. 83, no. 11, pp. 31505-31526, March 2024, doi: https://doi.org/10.1007/s11042-023-16662-6.
[19] P. Kumar, R. Kumar, G. P. Gupta, R. Tripathi, A. Jolfaei, and A. N. Islam, “A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system,” Journal of Parallel and Distributed Computing, vol. 172, pp. 69-83, February 2023, doi: https://doi.org/10.1016/j.jpdc.2022.10.002.
[20] S. Rahmadika, P. V. Astillo, G. Choudhary, D. G. Duguma, V. Sharma, and I. You, “Blockchain-based privacy preservation scheme for misbehavior detection in lightweight IoMT devices,” IEEE Journal of Biomedical and Health Informatics, vol. 27, no. 2, pp. 710-721, June 2022, doi: https://doi.org/10.1109/JBHI.2022.3187037.
[21] T. S. Pooja, and P. Shrinivasacharya, “Evaluating neural networks using Bi-Directional LSTM for network IDS (intrusion detection systems) in cyber security,” Global Transitions Proceedings, vol. 2, no. 2, pp. 448-454, November 2021, doi: https://doi.org/10.1016/j.gltp.2021.08.017.
[22] A. Aldallal, “Toward efficient intrusion detection system using hybrid deep learning approach,” Symmetry, vol. 14, no. 9, pp. 1916, September 2022, doi: https://doi.org/10.3390/sym14091916.
[23] P. Qi, D. Chiaro, F. Giampaolo, and F. Piccialli, “A blockchain-based secure Internet of medical things framework for stress detection,” Information Sciences, vol. 628, pp. 377-390, May 2023, doi: https://doi.org/10.3390/sym14091916.
[24] S. K. Somayaji, M. Alazab, M. K. Manoj, A. Bucchiarone, C. L. Chowdhary, and T. R. Gadekallu “A framework for prediction and storage of battery life in IoT devices using DNN and blockchain,” In 2020 IEEE Globecom Workshops (GC Wkshps), pp. 1-6, December 2020, doi: https://doi.org/10.1109/GCWkshps50303.2020.9367413.
[25] H. Singh, Z. Ahmed, M. D. Khare, and J. Bhuvana, “An IoT and blockchain-based secure medical care framework using deep learning and nature-inspired algorithms,” International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 8s, pp. 183-191, July 2023.
[26] B. Jaishankar, S. Vishwakarma, P. Mohan, A. K. S. Pundir, I. Patel, and N. Arulkumar, “Blockchain for securing healthcare data using squirrel search optimization algorithm,” Intelligent Automation & Soft Computing, vol. 32, no. 3, pp. 1815-1829, January 2022, doi: http://dx.doi.org/10.32604/iasc.2022.021822.
[27] W. Dai, X. Li, W. Ji, and S. He, “Network intrusion detection method based on CNN, BiLSTM, and attention mechanism,” IEEE Access, vol. 12, pp. 53099 - 53111, April 2024, doi: https://doi.org/10.1109/ACCESS.2024.3384528.
[28] D. Wu, L. Wu, T. Wen, and L. Li, “Microgrid operation optimization method considering power-to-gas equipment: An improved gazelle optimization algorithm,” Symmetry, vol. 16, no. 1, pp. 83, January 2024, doi: https://doi.org/10.3390/sym1601
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2025 Rolly Saxena, Srinivasa Rao D

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License







