Fusion of Machine Learning and Blockchain-based Privacy-Preserving Approach for Health Care Data in the Internet of Things
- URL: http://arxiv.org/abs/2510.19026v1
- Date: Tue, 21 Oct 2025 19:09:46 GMT
- Title: Fusion of Machine Learning and Blockchain-based Privacy-Preserving Approach for Health Care Data in the Internet of Things
- Authors: Behnam Rezaei Bezanjani, Seyyed Hamid Ghafouri, Reza Gholamrezaei,
- Abstract summary: The rapid integration of Internet of Things (IoT) devices into the healthcare sector has brought about revolutionary advancements in patient care and data management.<n>These technological innovations raise critical security concerns, particularly in safeguarding medical data against potential cyber threats.<n>We propose a comprehensive method encompassing three distinct phases to address the imperative need for enhanced security in IoT-based healthcare systems.
- Score: 0.5097809301149341
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: In recent years, the rapid integration of Internet of Things (IoT) devices into the healthcare sector has brought about revolutionary advancements in patient care and data management. While these technological innovations hold immense promise, they concurrently raise critical security concerns, particularly in safeguarding medical data against potential cyber threats. The sensitive nature of health-related information requires robust measures to ensure the confidentiality, integrity, and availability of patient data in IoT-enabled medical environments. Addressing the imperative need for enhanced security in IoT-based healthcare systems, we propose a comprehensive method encompassing three distinct phases. In the first phase, we implement Blockchain-Enabled Request and Transaction Encryption to strengthen data transaction security, providing an immutable and transparent framework. In the second phase, we introduce a Request Pattern Recognition Check that leverages diverse data sources to identify and block potential unauthorized access attempts. Finally, the third phase incorporates Feature Selection and a BiLSTM network to enhance the accuracy and efficiency of intrusion detection using advanced machine learning techniques. We compared the simulation results of the proposed method with three recent related methods: AIBPSF-IoMT, OMLIDS-PBIoT, and AIMMFIDS. The evaluation criteria include detection rate, false alarm rate, precision, recall, and accuracy - crucial benchmarks for assessing the overall performance of intrusion detection systems. Our findings show that the proposed method outperforms existing approaches across all evaluated criteria, demonstrating its effectiveness in improving the security of IoT-based healthcare systems.
Related papers
- Privacy-Preserving Healthcare Data in IoT: A Synergistic Approach with Deep Learning and Blockchain [0.5097809301149341]
The integration of Internet of Things (IoT) devices in healthcare has revolutionized patient care by enabling real-time monitoring, personalized treatments, and efficient data management.<n>Traditional security measures are often insufficient to address the unique challenges posed by IoT environments.<n>We propose a comprehensive three-phase security framework designed to enhance the security and reliability of IoT-enabled healthcare systems.
arXiv Detail & Related papers (2025-10-21T12:21:49Z) - Trustworthy Medical Question Answering: An Evaluation-Centric Survey [40.76054471378203]
We systematically examine six key dimensions of trustworthiness in medical question-answering systems.<n>We analyze evaluation-guided techniques that drive model improvements.<n>We propose future research directions to advance the safe, reliable, and transparent deployment of LLM-powered medical QA.
arXiv Detail & Related papers (2025-06-04T07:48:10Z) - Revisiting Medical Image Retrieval via Knowledge Consolidation [46.6989555659494]
We propose a novel method to consolidate knowledge of hierarchical features and functions.<n>We introduce Depth-aware Representation Fusion (DaRF) and Structure-aware Contrastive Hashing (SCH)<n>Our method achieves a 5.6-38.9% improvement in mean Average Precision on the anatomical radiology dataset.
arXiv Detail & Related papers (2025-03-12T13:16:42Z) - Revolutionizing Healthcare Record Management: Secure Documentation Storage and Access through Advanced Blockchain Solutions [0.0]
This research introduces a novel blockchain-based EHR system designed to significantly enhance security, scalability, and accessibility.<n>The proposed system leverages a hybrid security algorithm combining Argon2 and AES and integrates a hybrid storage and consensus mechanism.<n>It utilizes advanced blockchain tools like MetaMask, Ganache, and Truffle to facilitate interaction with the decentralized network.
arXiv Detail & Related papers (2025-03-02T05:39:14Z) - CryptoDNA: A Machine Learning Paradigm for DDoS Detection in Healthcare IoT, Inspired by crypto jacking prevention Models [0.0]
The rapid integration of the Internet of Things (IoT) and Internet of Medical (IoM) devices in the healthcare industry has markedly improved patient care and hospital operations.<n>DDoS attacks present significant dangers, jeopardizing operational stability and patient safety.<n>This study introduces CryptoDNA, an innovative machine learning detection framework influenced by cryptojacking detection methods.
arXiv Detail & Related papers (2025-01-30T18:22:16Z) - A Federated Learning Platform as a Service for Advancing Stroke Management in European Clinical Centers [37.285731240749904]
This paper introduces a novel Federated Learning (FL) platform designed to support the configuration, monitoring, and management of FL processes.
Considering the production sensitivity inherent in clinical environments, we emphasize the security of the proposed FL architecture.
The platform has been successfully tested in various operational environments using a publicly available dataset.
arXiv Detail & Related papers (2024-10-02T09:24:05Z) - Automated Phishing Detection Using URLs and Webpages [35.66275851732625]
This project addresses the constraints of traditional reference-based phishing detection by developing an LLM agent framework.
This agent harnesses Large Language Models to actively fetch and utilize online information.
Our approach has achieved with accuracy of 0.945, significantly outperforms the existing solution(DynaPhish) by 0.445.
arXiv Detail & Related papers (2024-08-03T05:08:27Z) - Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems [1.3955252961896318]
The Internet of Medical Things (IoMT) revolutionizes healthcare by facilitating early disease detection and tailored care, particularly in chronic disease management.<n>Its benefits are countered by significant security challenges that endanger the lives of its users due to the sensitivity and value of the processed data.<n>A new framework for Intrusion Detection Systems is introduced, leveraging Artificial Neural Networks for intrusion detection while utilizing Federated Learning for privacy preservation.
arXiv Detail & Related papers (2024-03-14T11:57:26Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Blockchain-empowered Federated Learning for Healthcare Metaverses:
User-centric Incentive Mechanism with Optimal Data Freshness [66.3982155172418]
We first design a user-centric privacy-preserving framework based on decentralized Federated Learning (FL) for healthcare metaverses.
We then utilize Age of Information (AoI) as an effective data-freshness metric and propose an AoI-based contract theory model under Prospect Theory (PT) to motivate sensing data sharing.
arXiv Detail & Related papers (2023-07-29T12:54:03Z) - U-PASS: an Uncertainty-guided deep learning Pipeline for Automated Sleep
Staging [61.6346401960268]
We propose a machine learning pipeline called U-PASS tailored for clinical applications that incorporates uncertainty estimation at every stage of the process.
We apply our uncertainty-guided deep learning pipeline to the challenging problem of sleep staging and demonstrate that it systematically improves performance at every stage.
arXiv Detail & Related papers (2023-06-07T08:27:36Z) - FedBlockHealth: A Synergistic Approach to Privacy and Security in
IoT-Enabled Healthcare through Federated Learning and Blockchain [2.993954417409032]
The rapid adoption of Internet of Things (IoT) devices in healthcare has introduced new challenges in preserving data privacy, security and patient safety.
Traditional approaches need to ensure security and privacy while maintaining computational efficiency.
This paper proposes a novel hybrid approach combining federated learning and blockchain technology to provide a secure and privacy-preserved solution.
arXiv Detail & Related papers (2023-04-16T01:55:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.