Next Article in Journal
Why Individuals Do (Not) Use Contact Tracing Apps: A Health Belief Model Perspective on the German Corona-Warn-App
Previous Article in Journal
Short Video Addiction on the Interaction of Creative Self-Efficacy and Career Interest to Innovative Design Profession Students
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Optimization-Linked Intelligent Security Algorithm for Smart Healthcare Organizations

by
Reyazur Rashid Irshad
1,
Ahmed Abdu Alattab
1,
Omar Ali Saleh Alsaiari
1,
Shahab Saquib Sohail
2,*,
Asfia Aziz
2,
Dag Øivind Madsen
3,* and
Khaled M. Alalayah
1
1
Department of Computer Science, College of Science and Arts, Najran University, Sharurah 68341, Najran, Saudi Arabia
2
Department of Computer Science and Engineering, SEST, Jamia Hamdard, New Delhi 110062, India
3
USN School of Business, University of South-Eastern Norway, 3511 Hønefoss, Norway
*
Authors to whom correspondence should be addressed.
Healthcare 2023, 11(4), 580; https://doi.org/10.3390/healthcare11040580
Submission received: 29 December 2022 / Revised: 24 January 2023 / Accepted: 10 February 2023 / Published: 15 February 2023

Abstract

:
IoT-enabled healthcare apps are providing significant value to society by offering cost-effective patient monitoring solutions in IoT-enabled buildings. However, with a large number of users and sensitive personal information readily available in today’s fast-paced, internet, and cloud-based environment, the security of these healthcare systems must be a top priority. The idea of safely storing a patient’s health data in an electronic format raises issues regarding patient data privacy and security. Furthermore, with traditional classifiers, processing large amounts of data is a difficult challenge. Several computational intelligence approaches are useful for effectively categorizing massive quantities of data for this goal. For many of these reasons, a novel healthcare monitoring system that tracks disease processes and forecasts diseases based on the available data obtained from patients in distant communities is proposed in this study. The proposed framework consists of three major stages, namely data collection, secured storage, and disease detection. The data are collected using IoT sensor devices. After that, the homomorphic encryption (HE) model is used for secured data storage. Finally, the disease detection framework is designed with the help of Centered Convolutional Restricted Boltzmann Machines-based whale optimization (CCRBM-WO) algorithm. The experiment is conducted on a Python-based cloud tool. The proposed system outperforms current e-healthcare solutions, according to the findings of the experiments. The accuracy, precision, F1-measure, and recall of our suggested technique are 96.87%, 97.45%, 97.78%, and 98.57%, respectively, according to the proposed method.

1. Introduction

In a growing network, the Internet of Things (IoT) [1] connects the system with the internet to exchange data with sensors, devices, and technology. It can connect lights, cars, and home appliances. These appliances [2] are programmed to do some processes and also transmit information. There are more than 10 billion active devices, and these devices are connected over the internet. It is connected to systems and consumer networks. When an attack on devices takes place the consumer system will get affected. Two or more computers are connected by a communication device with a set of rules. Some of the IoT protocols [3] are Bluetooth, WiFi, Web socket, Data Distribution Service (DDS), HyperText Transfer Protocol (HTTP), Transmission Control Protocol (TCP), and so on.
These protocols are familiar in the network that divides data into packets. Specifically, Bluetooth technology [4] is used to connect various devices. Different types of connections, such as memory, range, and power, are utilized. Data are transmitted from the device to connect sensors and the network. This increases security, capacity, and network agility; reduces operational costs; optimizes logistics networks; and manages records. In hospitals, it plays an important role in predicting patient diseases. Sensors [5] are used in wheelchairs, oxygen pumps, monitoring equipment, and tracking.
The health condition is monitored to achieve desired outcomes. In IoT security, the system is designed to be secure and identify risks in order to protect itself from hackers and violations. Healthcare organizations [6] that control the devices can decrease attacks, identify security issues, and respond to real-time security threats. It allows for safe connections to both private and public devices. Privacy is of utmost importance in protecting the user’s data. Health conditions can be quickly identified, and issues can be monitored in real time. The system can communicate with devices to identify objects in the IoT environment [7]. Security is protected by encrypting connections, monitoring the system, and securing system connections. Insecure connections can lead to data breaches in the end-to-end process. Limitations of existing methods include issues with accuracy, cost, and handling large datasets. A novel healthcare monitoring system is proposed in this study that will track disease processes and predict diseases based on data obtained from patients in distant communities.
Data gathering, secure storage, and disease detection are the three primary stages of the suggested system. IoT sensor devices are used to acquire the data. For safe data storage, the homomorphic encryption (HE) model is applied. Using the Centered Convolutional Restricted Boltzmann Machines-based Whale optimization (CCRBM-WO) algorithm, the illness identification framework is created. Finally, we test the validity of the suggested healthcare monitoring study.
The rest of the article is delineated as follows: Section 2 explains the related works, and the proposed model is designed in Section 3. Section 4 discusses the experimental study, and the paper ends in Section 5.

2. Related Works

Elhoseny et al. [8] propose a hybrid security model (HSM) from medical images to secure diagnostic text data. This model performs two types of levels, which are 2D Discrete Wavelet Transform 1 Level (2D-DWT-1L) and 2D Discrete Wavelet Transform 2 Level (2D-DWT-2L), to hide the secret image. The text size is different to cover the encrypted images. This method secures the information safely and gradually increases encrypted data. Thus, it increases the capacity for communication protocols.
Mutlag et al. [9] have described a fog computing framework in IoT healthcare systems. It consists of three processes: plan, conduct, and document. It identifies and evaluates the process. Selecting the data and extracting documents is observed to give the desired result. Many fog nodes are added to fog computing. It is scalable and reliable for computing. Hence, the methods and frameworks can be improved.
Luo et al. [10] have stated Slepian–Wolf coding-based secret sharing (SW-SSS) to share the secret data. For privacy purposes, the information is defended by using a distributed database for various servers. It also provides the information of the user, but the personal data are not accessed by the user. The security is protected by the privacy protector framework. Thus, the collision should be avoided.
Haghi et al. [11] developed a prototype for monitoring innovative wrist-worn and flexible IoT healthcare. The parameters are measured by the end-to-end communication for different products. The sensor nodes are implemented by the end-user application to monitor the parameter. It is flexible to monitor the diseases from different vendors. The parameters are processed and transmitted efficiently in large observations, although it is extended in clinical analysis.
Subramaniyaswamy et al. [12] demonstrated ProTrip, which handles health and nutrition for an ontology framework. Nutritive food is considered by the recommender system, and climate change is considered to determine the availability of products. The information, actions, and opinions are formulated from the data of the user. It is user-friendly, and the accuracy and efficiency are estimated by this method. In addition, for mobile users, the interface will be upgraded.
For optimization, Shankar et al. [13] shared a hybrid encryption algorithm to secure medical images in IoT. The cloud server stores the information of the user in the database. The optimal key is used to store information in the form of hybrid swarm optimization. Both the encryption and decryption process take place to evaluate the image quality. The information and images are secured in this algorithm. Thus, the tamper localization scheme is executed.
For telehealth applications, Thakur, et al. [14] implemented a transform domain technique (TDT) for the watermark encryption algorithm. The problems of health data are determined by the watermarking and cryptography in the telehealth field. The techniques are divided into two; they are the transform and spatial domains. It is robust in the transform technique. The data of the user are safe in the telehealth method. Hence, the technique is determined for videos and various watermarkings.
Gupta et al. [15] proposed the traditional Optimized Cuttlefish Algorithm (OCFA) for the optimal subset of features. There are two classifiers for selecting the features; they are a k-nearest neighbor and decision tree classifiers. It evaluates Parkinson’s speech, which monitors the nervous disorder. The dataset is identified by Parkinson’s handwriting samples and determines the disease at the starting stage. It is easy to identify and implement the data. However, it is applied to the Image dataset.
Diaz-Cortes et al. [16] described a Dragon Algorithm (DA) for optimization technique. The images are divided into the same units for the histogram to threshold the valleys and peaks. The number of classes of each value is determined for the threshold data. The selected images are segmented images to generate sharp borders. Moreover, skin cells are evaluated for a large dataset.
Pavitra et al. [17] suggested a concept of IoT-based environments to determine the performance and accessibility of smart healthcare systems. On the other side, traditional healthcare systems no longer fulfill the demands of a frequently expanding and developing community. Further, the research works figure out how to provide a specially designed for an IoT-based e-healthcare system, especially to engage with interoperability problems. Subsequently, considering diverse technological standards and communication protocols, the specific necessity of the IoT system was identified and offered as a base for the development of the system.
Based on the IoT-based healthcare system, Rajan Jeyaraj et al. [18] introduced deep learning model for patient monitoring system. Four-signal prediction accuracy for multiple individuals was calculated to validate the proposed Smart Monitor system. An accuracy rate of 97.2% was achieved in the technology demonstrator experimental set-up. This demonstrates that the proposed automated system is trustworthy and effective. The researchers verified the system’s ability to provide reliable assistance and accurate signal prediction based on the experimental findings.
In the IoMT-enabled smart healthcare system, Kumar et al. [19,20,21,22] suggested a novel architectural framework. To preserve privacy, an exponential K-anonymity algorithm was used, and the sensitivity data level was analyzed with the improved Elman neural network (IENN). Then, the IENN weights were updated via Gaussian-mutated chimp optimization. Furthermore, in this system, data are stored in a cloud domain controller via blockchain technology. In this research work, the suggested methods outperformed conventional systems. Table 1 summarizes the related work.

3. Proposed Methodology

Three major points namely data collection, storage security, and disease detection model occupy the proposed smart healthcare monitoring organization. First, the information is compiled through individuals who are directly accessible remotely. Second, using the suggested lockable storage paradigm, the acquired data are safely known as a cloud database. Third, the collected data can be accessed from one cloud server, which predicts each patient’s condition level throughout this experiment. Figure 1 illustrates the proposed framework.

3.1. Data Collection

For numerous ailments including heart disease, cancer, and diabetes, patient data can be gathered from distantly accessible individuals utilizing suitable IoT devices [6]. Many types of IoT systems have the appropriate sensors to gather cancer, diabetes, and cardiovascular disease indicators, such as ECG values, heart rate, and glucose level. For each patient with a patient identification number, the key characteristics were collected and saved as a distinct database [23].
With the assistance of the lockable storage module, the gathered information would be safely transmitted to the cloud server via the information gathering module, user interface module, and decision administrator. The data-gathering agents collect the information and send it to the interface component [24]. The user interface module selects the essential functionality and sends them to the decision manager for storage. The pre-processed data are sent to the protected storage component for encryption/decryption before being placed in the cloud database by the choice manager.

3.2. Secured Storage

The homomorphic encryption (HE) model for secured data storage is delineated in this section. Traditional encryption systems are not truly secure from an intermediary, such as another server, due to sensitive data privacy breaches. HE is a type of encryption that can be used to address privacy and security challenges [25].
Homomorphic encryption allows for third-party telecommunications companies to execute specific activities on patients’ encrypted files while decoding them, but while respecting the confidentiality of encrypted data’s confidentiality [26]. When a user wants to access certain data on a public cloud using encryption algorithms, he firstly encodes the information and then puts the encoded information in the cloud. The user then transmits information about the study to the cloud server after some time has passed. Without knowing the contents of the encrypted data, the cloud server uses HE to perform a prediction algorithm on it. The homomorphic encryption framework for data storage is delineated in Figure 2.
Homomorphic addition is given as follows:
F ( N 1 ) + F N 2 = N 1 e + N 2 e = ( N 1 + N 2 ) e = F N 1 + N 2
Homomorphic multiplication is given as follows:
F ( N 1 ) × F N 2 = N 1 e × N 2 e = ( N 1 × N 2 ) e = F N 1 × N 2
The number of numerical operations on encrypted message depends upon three classes of HE, namely Fully Homomorphic Encryption (FHE), Somewhat Homomorphic Encryption (SHE), and Partially Homomorphic Encryption (PHE) [27].
FHE permits an endless number of various sorts of assessment procedures to be performed on the encrypted message.
Only one form of arithmetic operation, whether adding or multiplying, is allowed on the encrypted message in the PHE system, and it can be done endless times repeatedly.
All multiplication operations are permitted in SHE for a limited number of repetitions.
For its capacity to calculate encrypted files while guaranteeing security and privacy to users, the HE was used in a variety of fields.

3.3. Disease Detection Framework

In this section, we employed Centered Convolutional Restricted Boltzmann Machines-based whale optimization (CCRBM-WO) algorithm for disease prediction. Disease-level prediction is based on acquired patient information and best classification samples, such as the UCI Repository Machine Learning Dataset, which are common in research. Two key elements make up the suggested forecasting models. To determine the severity, conduct a symptom-based severity analysis utilizing the CCRBM model based on the patient’s data in the form of texts and calculate the confidence score. The system then compares the consequences’ ratings and displays the cancer symptoms of cancer for the specific data by combining the severity rating features with the respective user ratings. The subsequent sections explain these two parts in the proposed disease forecasting model in further detail.

3.3.1. Centered Convolutional Restricted Boltzmann Machines

By including the centered elements in the learning process, the CCRBM model minimizes the inabilities that occur from approximation and structure. The CRBM can handle the high computational complexity involved with the traditional RBM. The CRBM, like the RBM, has two layers: the visible (v) and hidden layers (h) [28]. A Convolutional Deep Belief Network is added to the CCRBM to improve its operation. A probabilistic max-pooling procedure is added to process the text’s higher-level information.
The detection layer and the pooling layer are the two layers that make up the concealed layer. The detector layer uses a constant factor to convolve the findings computed either by the preceding feature descriptor. The pooling layer reduces the input of the detection layer by using the same constant factor. Each unit in the pooling layer has the objective of increasing the probability of the units in a limited area of the detection layer [29]. To capture higher layer representations and reduce computational complexity, max pooling is used to reduce activation. The following is a simple probabilistic max pooling CCRBM:
S u b j e c t t o ( j , k ) C γ h j , k l 1 , L , γ
F ( v , h ) = l j , k ( h j , k l ( ω l v ) j , k + β l h j , k l ) ο j , k v j , k  
In the preceding equation, the convolutional operation is represented by h *, and the Lth class gets the bottom-up signal from layer b as indicated elsewhere here:
S ( a j , k l ) Δ ¯ ¯ β l + ( ω l a ) j k
Assume that the block’s hidden unit ( S ( h j , k l ) ) is j , k C γ . When, S ( h j , k l ) is an increase in energy due to the hidden unit, the conditional probability is determined ( h j , k l ).
P ( h j , k l = 1 / v ) = exp ( S ( h j , k l ) ) 1 + ( j , k ) C γ exp ( S ( h j , k l ) )
P ( Z δ l = 0 / I ) = 1 1 + ( j , k ) C γ exp ( S ( h j , k l ) )  
The pooled layer is represented in Equation (5). Approximation and structural instability are two types of instability [30]. A noisy gradient is returned during approximation, causing deviation from the true value. Instead of dependencies, the weight vector in Equation (24) is a global bias applied in each unit. This is a significant problem for RBM, which has numerous layers, including DBN and Convolutional Deep Belief Networks. The hidden units’ bias values can increase speed, but they are unable to handle the learning process that occurs between the hidden units [31]. To address these concerns, this model employs centered factors to relieve the causes of instability by resolving the gradient and centering the unit activations. To address these challenges, this model employs centered factors to lessen the sources of volatility by solving the gradient calculation and centering the unit activations. By avoiding the use of a global bias, the noise in this process is decreased.
F ( b / a ) = l j , k ( ( a j , k k ( α a ) j , k l ) ( ω 1 ( b α b ) ) j , k + a l ( a j , k l ( α a ) j , k l ) ) c j , k ( b j , k ( α H ) j , k )
P ( Z δ l = 0 / b ) = 1 1 + ( j , k ) C γ exp ( Δ S ( a j , k l ) )
The distances for both hidden and transparent units are represented by parameters α h and α v , respectively. To ensure that the units are centered, the hidden and visible layer biases are set to α h 0 = σ β 0 and α v 0 = σ o 0 , respectively. When the hidden units are given, the CRBM conditional probability is recast as stated in Equation (29) and the sample likelihood function of visible units is proved as shown in:
P ( Z δ l = 0 / v ) = exp ( Δ S ( h j , k l ) 1 + ( j , k ) C γ exp ( Δ S ( h j , k l ) )
Δ S ( h j , k l ) Δ ¯ ¯ β l + ( ω l ( h α a ) ) j , k
P ( v j , k = 1 / h ) = ε l ω l ( h l ( α H ) l j , k + o  
The update equations are adjusted as follows using the new centered factors:
β = β + ω ( v α v )
o = o + ω ( h α a )  
δ a = h , δ b = v  

3.3.2. Whale Optimization Algorithm

The convergence speed of the intelligence technique can be reduced when there exist numerous variables. Moreover, the selection of parameters manually also mitigates the optimization. To surmount these issues, we use WOA algorithm, which effectively estimates the random interval and direction.
A. Hunting strategy of whales
The WOA hunting strategy is based on the bubble net foraging technique. The steps involved in the hunting process are shown below.
Stage-1: Surrounding the victim
The objective can be chosen by the acquired optimal solution [32]. The location of other whales is also updated accordingly, which can be statistically formulated as follows:
M = R G ( i ) G ( i )
G ( k + 1 ) = G ( k ) F S
F = 2 f y f
R = 2 y
The value of f lies between 0 and 2 and decreases linearly, and y lies in the range of 0 to 1 and is a random vector [33]. The coefficient vectors are denoted as F and R , and the current iteration is represented as i. G is the location vector with the optimal solution. Finally, the interval between the prey and the whale is indicated as S.
Stage-2: Attacking the prey using the bubble net strategy
The bubble net strategy involves two procedures: shrink encircling (A1) and spiral updating mechanisms (A2).
A1: The new location of the F can be updated by the value of F , which lies between the range of [−f, f] with the utilization of f and y .
A2: This can be evaluated by using the equation given below,
R = G * ( i ) G ( i )
G ( k + 1 ) = R y d s cos ( 2 π s ) + G ( k )  
The values of d and s are constant and lie in the interval of −1 and 1 [34]. The location of the whale can be upgraded with a certain probability of value p. This can be numerically expressed as,
G ( k + 1 ) = G ( k ) F S i f p < 0.5 R e d s cos ( 2 π s ) + G ( k ) i f p > 0.5
Stage-3: Exploring the prey
The exploration ability of the whale can be enhanced with the upgrading of the search agent and its respective location according to the criteria F > 1 , which is expressed below,
S = R . G r a n d G
G ( k + 1 ) = G * ( k ) F S
Thus, the arbitrary optimal solution can be picked, and the stages of exploration and exploitation can be selected with the involvement of F . The procedure of A1 or A2 can be followed by the p value. These steps will be repeated until you reach the required condition.

3.3.3. CCRBM-Based WO Algorithm

Figure 3 depicts the overall framework of the proposed methodology. The input and output vectors for the sentiment analysis problem are determined in the first stage. The CCRBM model is created based on the problem. The hidden layer, the visible layer, and the number of neurons in each layer are the essential components of the structure [35]. Apart from the network structure, the link weights and the threshold value of the hidden nodes are also important elements. These are the parameters that the WO method for optimization [36] takes as the input. Each atom in the population is a starting point for the sentimental analysis problem in the CCRBM models.
To analyze complicated data in a non-linear fashion, the CCRBM relies heavily on the initial parameter setting. The WO algorithm is used to select the starting parameters of the CCRBM model in this paper. The whales in the population are unfurled into a parameter configuration of the CCRBM network during optimization [37]. The network is trained using the training data when the parameter initialization phase is completed. Each whale is used to establish the local best value, and the global best solution’s position is upgraded as a result. The major novelty of this study is to improve the detection performance of Centered Convolutional Restricted Boltzmann Machines with the usage of the whale optimization algorithm, thereby providing good detection accuracy. When the end condition is met, the global best solution found during the exploration stage is used to predict the diseases. Finally, we predict various kinds of disease using CCRBM-based WO algorithm employed via the IoT healthcare organization framework.

4. Experimental Analysis

This section explains the experimental analysis and their respective outcomes in a detailed form. The experiment is conducted with Python software. For the analysis purpose, we use the dataset known as the University of California, Irvine (UCI), which includes different types of diseases. In a healthcare monitoring organization, the security level is increased by the HE algorithm and enhances the safety of the patients with early detection. This section also encloses the performance metrics along with the comparative study. Table 2 describes the simulation of the parameters.

4.1. Dataset Description

The taken UCI dataset includes various benchmark disease datasets. The various diseases, such as diabetes, heart, and cancer diseases, are included in this standard dataset. The various types of diseases are predicted using the proposed model. From this, 80% of the data are used for training, and the remaining 20% for testing purposes.

4.2. Performance Evaluation

The performance metrics are divided into secured storage and performance metrics for the prediction of diseases in the healthcare monitoring organization.

4.3. Performance Metrics for Secured Storage

The storage in the cloud system can be analyzed by the metrics such as encryption time, decryption time, and key generation time. The definition for all those things is explained below.

4.3.1. Encryption Time

It is defined as the total time required for the ending of encryption of data in the healthcare monitoring organization to enhance the security level.
A T = A S A B
The encryption time required for the encryption of data is indicated as A T . The beginning time is denoted as A B , and the end time is indicated as A S .

4.3.2. Key Generation Time

It is defined as the time taken by the system to generate the key while transmitting the data in the healthcare monitoring organization. It can be expressed as follows:
B T = B e n d B s t a r t
Here, the key generation time is represented as B T . The time at which the key generation started is represented as B s t a r t , and the ending time is denoted as B e n d .

4.3.3. Decryption Time

It is defined as the time taken by the system in the healthcare monitoring organization to complete the decryption process. It can be evaluated as shown below,
C T = C e n d C s t a r t
The decryption time is denoted as C T . The starting time of the process is indicated as C s t a r t , and the finishing time is indicated as C e n d .

4.4. Performance Metrics for the Prediction of Disease in the Healthcare Monitoring Organization

The proposed CCRBM-based WO approach for the prediction of disease in the healthcare monitoring organization can be analyzed by the metrics such as precision, security analysis, accuracy, F1-measure, and recall. They are explained below.

4.4.1. Precision (Pr)

It is defined as exactly predicting dead disease from the datasets from the exact value. It can be defined as follows,
P = A P A P + B P

4.4.2. Accuracy (Acc)

The accuracy can be defined as how accurately the prediction of dead diseases using the proposed health care monitoring system is made. It can be evaluated as follows,
A c c = A P + A N A N + B N + A P + B P
Here, AP indicates the true positive rate, AN indicates the true negative rate, BN indicates the false negative rate, and BP indicates the false positive rate of the proposed healthcare monitoring organization.

4.4.3. Security Analysis (SA)

The effective protection of data from the healthcare monitoring organization is determined by the security analysis parameter. It can be evaluated as follows,
S A = H a c k e d d a t a o r i g i n a l d a t a

4.4.4. F1-Measure

It is defined as the accurate prediction of deadly diseases by our proposed approach. The following equation explains the F1-measure value.
F 1 m e a s u r e = 2 ( Pr R c ) Pr + R c

4.4.5. Recall (Rc)

The prediction of deadly diseases and normal data from the taken datasets by our proposed approach is defined as recall. It can be explained as follows,
R c = A P A P + A N

4.5. Performance Evaluation Based on the Storage Security Metrics

As mentioned in the previous section, storage security can be measured by the parameters such as decryption time, key generation time, decryption time, and security analysis. The key generation time of our proposed encryption approach and other approaches such as Rivest–Shamir–Adleman (RSA) [38], Elliptic Curve Cryptography (ECC) [39], Modified Elliptic Curve Cryptography [40], and Attribute-based encryption [41]. Figure 4 illustrates the performance evaluation based on the key generation time. The performances are conducted for a different number of cloud users such as 250, 500, 750, 1000, and 1250. From the graphical representation, we found that, for a number of cloud clients, our proposed approach utilizes less time for the key generation. This is due to the fact that the proposed HE approach can effectively generate the key in very little time. The key generation times of our proposed approach for cloud clients 250, 500, 750, 1000, and 1250 are evaluated as 28 ms, 44 ms, 56 ms, 69 ms, and 72 ms, respectively.
Figure 5 illustrates the storage security analysis based on the encryption time for our proposed approach and the other encryption approaches such as Rivest–Shamir–Adleman (RSA) [38], Elliptic Curve Cryptography (ECC) [39], Modified Elliptic Curve Cryptography [40], and Attribute-based encryption [41]. The encryption time of our proposed approach is the lowest for all five scenarios as mentioned above. Therefore, our proposed approach reduces the computational complexity that usually occurs in the smart healthcare monitoring organization.
The storage security analysis based on the decryption time of proposed and other state-of-the-art works is explained in Figure 6. The decryption time of our proposed approach is low as shown in the figure. The security of the proposed approach is analyzed based on how much the system is threat-proof, and it is illustrated in Figure 7. From the figure, we observed that the proposed approach security is higher than all the other approaches, such as Rivest–Shamir–Adleman (RSA) [38], Elliptic Curve Cryptography (ECC) [39], Modified Elliptic Curve Cryptography [40], and Attribute-based encryption [41]. The security level of the proposed approach is 98.2% and the RSA achieves 89%, ECC achieves 94.3%, the MECC exhibits 96.45%, and the ABE shows 87.45%.

4.6. Performance Analysis Based on the Prediction of Diseases

The performance analysis based on the prediction of diseases is analyzed with the metrics mentioned above. The proposed approach work is compared with state-of-art works, such as HSM [8], SW-SSS [10], TDT [14], OCFA [15], and the Random Hashing Mechanism [21,42]. The comparative study is illustrated in Table 3. From the table, it is noted that the accuracy, precision, F1-measure, and recall of our proposed approach are 96.87%, 97.45%, 97.78%, and 98.57%, respectively. These values are higher than those of the other approaches. This is because our proposed approach effectively predicts the diseases in order to maintain the healthcare monitoring organization effectively.

4.7. Performance Analysis Based on Execution Time

This section presents the comparative analysis based on the execution time for our proposed and other approaches, such as HSM [8], SW-SSS [10], TDT [14], and OCFA [15]. The proposed approach utilizes less execution time due to the reduction of key generation time, decryption time, and encryption time. The execution time of the proposed approach is 79 ms, as shown in Figure 8.

5. Conclusions

In this study, the intelligent security algorithm for smart healthcare organizations was performed using Centered Convolutional Restricted Boltzmann Machines-based whale optimization (CCRBM-WO) algorithm. Python software was used for the experiment. We used the University of California, Irvine (UCI) dataset, which contains a variety of disorders, for our investigation. The HE algorithm raises the security level of a healthcare monitoring organization and improves patient safety through early detection. Metrics such as encryption time, decryption time, and key generation time can be used to evaluate cloud storage. We included various numbers of cloud users, including 250, 500, 750, 1000, and 1250. For cloud customers 250, 500, 750, 1000, and 1250, the key generation time of our suggested approach was 28 ms, 44 ms, 56 ms, 69 ms, and 72 ms, respectively. For all five circumstances, the encryption time of our proposed method was faster than Rivest–Shamir–Adleman (RSA), Elliptic Curve Cryptography (ECC), Modified Elliptic Curve Cryptography, and Attribute-based encryption. As a result, the computational complexity that often arises in a smart healthcare monitoring organization is reduced by our proposed approach. The accuracy, precision, F1-measure, and recall of our suggested technique were 96.87%, 97.45%, 97.78%, and 98.57%, respectively, according to the proposed method. IoT devices tagged with sensors are used for tracking real-time location of medical equipment like oxygen pumps, nebulizers, defibrillators, wheelchairs, and other monitoring equipment. In the future, we plan to introduce a hybrid optimization algorithm for parameter tuning in the deep learning model.

Author Contributions

Conceptualization, R.R.I.; data curation, writing and managing, R.R.I., A.A.A. and O.A.S.A.; Reviewing and editing, S.S.S., A.A., D.Ø.M. and K.M.A.; Supervision, D.Ø.M. All authors have read and agreed to the published version of the manuscript.

Funding

The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the National Research Priorities funding program grant code (NU/NRP/SERC/11/9).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data can be provided on request from the first author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
  2. Aheleroff, S.; Xu, X.; Lu, Y.; Aristizabal, M.; Velásquez, J.P.; Joa, B.; Valencia, Y. IoT-enabled smart appliances under industry 4.0: A case study. Adv. Eng. Inform. 2020, 43, 101043. [Google Scholar] [CrossRef]
  3. Resner, D.; de Araujo, G.M.; Fröhlich, A.A. Design and implementation of a cross-layer IoT protocol. Sci. Comput. Program. 2018, 165, 24–37. [Google Scholar] [CrossRef]
  4. Collotta, M.; Pau, G.; Talty, T.; Tonguz, O.K. Bluetooth 5: A Concrete Step Forward toward the IoT. IEEE Commun. Mag. 2018, 56, 125–131. [Google Scholar] [CrossRef]
  5. Lee, H.-C.; Ke, K.-H. Monitoring of large-area IoT sensors using a lora wireless mesh network system: Design and evaluation. IEEE Trans. Instrum. Meas. 2018, 67, 2177–2187. [Google Scholar] [CrossRef]
  6. Selvaraj, S.; Sundaravaradhan, S. Challenges and opportunities in IoT healthcare systems: A systematic review. SN Appl. Sci. 2019, 2, 1–8. [Google Scholar] [CrossRef] [Green Version]
  7. Islam, M.; Rahaman, A.; Islam, R. Development of smart healthcare monitoring system in IoT environment. SN Comput. Sci. 2020, 1, 1–11. [Google Scholar] [CrossRef]
  8. Elhoseny, M.; Ramírez-González, G.; Abu-Elnasr, O.M.; Shawkat, S.A.; Arunkumar, N.; Farouk, A. Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 2018, 6, 20596–20608. [Google Scholar] [CrossRef]
  9. Mutlag, A.A.; Ghani, M.K.A.; Arunkumar, N.; Mohammed, M.A.; Mohd, O. Enabling technologies for fog computing in healthcare IoT systems. Futur. Gener. Comput. Syst. 2018, 90, 62–78. [Google Scholar] [CrossRef]
  10. Himeur, Y.; Sohail, S.S.; Bensaali, F.; Amira, A.; Alazab, M. Latest Trends of Security and Privacy in Recommender Systems: A Comprehensive Review and Future Perspectives. Comput. Secur. 2022, 118, 102746. [Google Scholar] [CrossRef]
  11. Haghi, M.; Neubert, S.; Geissler, A.; Fleischer, H.; Stoll, N.; Stoll, R.; Thurow, K. A flexible and pervasive IoT-based healthcare platform for physiological and environmental parameters monitoring. IEEE Internet Things J. 2020, 7, 5628–5647. [Google Scholar] [CrossRef]
  12. Subramaniyaswamy, V.; Manogaran, G.; Logesh, R.; Vijayakumar, V.; Chilamkurti, N.; Malathi, D.; Senthilselvan, N. An ontology-driven personalized food recommendation in IoT-based healthcare system. J. Supercomput. 2019, 75, 3184–3216. [Google Scholar] [CrossRef]
  13. Elhoseny, M.; Shankar, K.; Lakshmanaprabu, S.K.; Maseleno, A.; Arunkumar, N. Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput. Appl. 2018, 32, 10979–10993. [Google Scholar] [CrossRef]
  14. Thakur, S.; Singh, A.K.; Ghrera, S.P.; Elhoseny, M. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed. Tools Appl. 2018, 78, 3457–3470. [Google Scholar] [CrossRef]
  15. Gupta, D.; Julka, A.; Jain, S.; Aggarwal, T.; Khanna, A.; Arunkumar, N.; de Albuquerque, V.H.C. Optimized cuttlefish algorithm for diagnosis of Parkinson’s disease. Cogn. Syst. Res. 2018, 52, 36–48. [Google Scholar] [CrossRef]
  16. Díaz-Cortés, M.-A.; Ortega-Sánchez, N.; Hinojosa, S.; Oliva, D.; Cuevas, E.; Rojas, R.; Demin, A. A multi-level thresholding method for breast thermograms analysis using Dragonfly algorithm. Infrared Phys. Technol. 2018, 93, 346–361. [Google Scholar] [CrossRef]
  17. Pavitra, A.R.R.; Lawrence, I.D.; Maheswari, P.U. To Identify the Accessibility and Performance of Smart Healthcare Systems in IoT-Based Environments. In Using Multimedia Systems, Tools, and Technologies for Smart Healthcare Services; IGI Global: Hershey, PA, USA, 2023; pp. 229–245. [Google Scholar]
  18. Rajan Jeyaraj, P.; Nadar, E.R.S. Smart-monitor: Patient monitoring system for IoT-based healthcare system using deep learning. IETE J. Res. 2022, 68, 1435–1442. [Google Scholar] [CrossRef]
  19. Siddiqui, F.; Mohammad, A.; Alam, M.A.; Naaz, S.; Agarwal, P.; Sohail, S.S.; Madsen, D.Ø. Deep Neural Network for EEG Signal-Based Subject-Independent Imaginary Mental Task Classification. Diagnostics 2023, 13, 640. [Google Scholar] [CrossRef]
  20. Kumar, M.; Verma, S.; Kumar, A.; Ijaz, M.F.; Rawat, D.B. ANAF-IoMT: A Novel Architectural Framework for IoMT-Enabled Smart Healthcare System by Enhancing Security Based on RECC-VC. IEEE Trans. Ind. Inform. 2022, 18, 8936–8943. [Google Scholar] [CrossRef]
  21. Khadidos, A.O.; Shitharth, S.; Khadidos, A.O.; Sangeetha, K.; Alyoubi, K.H. Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism. J. Sens. 2022, 2022, 8457116. [Google Scholar] [CrossRef]
  22. Mufti, T.; Sohail, S.S.; Gupta, B.; Agarwal, P. Sustainable Approach for Cloud-Based Framework Using IoT in Healthcare. In Smart Technologies for Energy and Environmental Sustainability; Springer: Cham, Switzerland, 2022; pp. 231–244. [Google Scholar]
  23. Alansari, Z.; Soomro, S.; Belgaum, M.R.; Shamshirband, S. The Rise of Internet of Things (IoT) in big healthcare data: Review and open research issues. In Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing; Saeed, K., Chaki, N., Pati, B., Bakshi, S., Mohapatra, D., Eds.; Springer: Singapore, 2017; Volume 564. [Google Scholar] [CrossRef] [Green Version]
  24. Luo, E.; Bhuiyan, M.Z.A.; Wang, G.; Rahman, M.A.; Wu, J.; Atiquzzaman, M. Privacyprotector: Privacy-protected patient data collection in IoT-based healthcare systems. IEEE Commun. Mag. 2018, 56, 163–168. [Google Scholar] [CrossRef]
  25. Iott, B.; Anthony, D.; Pater, J.; Wagner, S.; Toscos, T.; Veinot, T. Nothing New Under the Sun: How Existing Screening Programs Can Inform the Design of Social Determinants of Health Screening in Health Care. In Health Services and Informatics Research; 2020; Volume 28, Available online: https://researchrepository.parkviewhealth.org/informatics/28/ (accessed on 28 December 2022).
  26. Kim, T.; Oh, Y.; Kim, H. Efficient privacy-preserving fingerprint-based authentication system using fully homomorphic encryption. Secur. Commun. Netw. 2020, 2020, 4195852. [Google Scholar] [CrossRef]
  27. Xu, J.; Wei, L.; Zhang, Y.; Wang, A.; Zhou, F.; Gao, C.-Z. Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 2018, 107, 113–124. [Google Scholar] [CrossRef]
  28. Gao, J.; Yang, J.; Wang, G.; Li, M. A novel feature extraction method for scene recognition based on centered convolutional restricted Boltzmann machines. Neurocomputing 2016, 214, 708–717. [Google Scholar] [CrossRef] [Green Version]
  29. Han, Z.; Liu, Z.; Han, J.; Vong, C.-M.; Bu, S.; Chen, C.L.P. Mesh convolutional restricted Boltzmann machines for unsupervised learning of features with structure preservation on 3-D meshes. IEEE Trans. Neural Netw. Learn. Syst. 2016, 28, 2268–2281. [Google Scholar] [CrossRef]
  30. Fatima, N.; Agarwal, P.; Sohail, S.S. Security and Privacy Issues of Blockchain Technology in Health Care—A Review. ICT Anal. Appl. 2022, 314, 193–201. [Google Scholar] [CrossRef]
  31. Yang, J.; Liu, S.; Wang, X. Centered convolutional deep Boltzmann machine for 2D shape modeling. Pers. Ubiquit. Comput. 2022, 26, 913–923. [Google Scholar] [CrossRef]
  32. Aljarah, I.; Faris, H.; Mirjalili, S. Optimizing connection weights in neural networks using the whale optimization algorithm. Soft Comput. 2018, 22, 1–15. [Google Scholar] [CrossRef]
  33. Mafarja, M.M.; Mirjalili, S. Hybrid Whale Optimization Algorithm with simulated annealing for feature selection. Neurocomputing 2017, 260, 302–312. [Google Scholar] [CrossRef]
  34. Rana, N.; Latiff, M.S.A.; Abdulhamid, S.I.M.; Chiroma, H. Whale optimization algorithm: A systematic review of contemporary applications, modifications and developments. Neural Comput. Appl. 2020, 32, 16245–16277. [Google Scholar] [CrossRef]
  35. Sailor, H.B.; Agrawal, D.M.; Patil, H.A. Unsupervised Filterbank Learning Using Convolutional Restricted Boltzmann Machine for Environmental Sound Classification. In Interspeech; 2017; Volume 8, pp. 1014–1027. Available online: https://www.semanticscholar.org/paper/Unsupervised-Filterbank-Learning-Using-Restricted-Sailor-Agrawal/f6fd1be38a2d764d900b11b382a379efe88b3ed6 (accessed on 28 December 2022).
  36. Abdel-Hamid, O.; Deng, L.; Yu, D. Exploring Convolutional Neural Network Structures and Optimization Techniques for Speech Recognition. In Interspeech; 2013; Volume 2013, pp. 1173–1175. Available online: https://www.semanticscholar.org/paper/Exploring-convolutional-neural-network-structures-Abdel-Hamid-Deng/655ae6f82c24e3e01b2b27c56512b06ba36d49c1 (accessed on 28 December 2022).
  37. Van Tulder, G.; de Bruijne, M. Combining Generative and Discriminative Representation Learning for Lung CT Analysis With Convolutional Restricted Boltzmann Machines. IEEE Trans. Med. Imaging 2016, 35, 1262–1272. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  38. Ye, G.; Jiao, K.; Huang, X. Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dyn. 2021, 104, 2807–2827. [Google Scholar] [CrossRef]
  39. Hafsa, A.; Sghaier, A.; Malek, J.; Machhout, M. Image encryption method based on improved ECC and modified AES algorithm. Multimed. Tools Appl. 2021, 80, 19769–19801. [Google Scholar] [CrossRef]
  40. Kumar, M.V.; Saini, K.S. An Optimized IWOA and MECC based MapReduce Framework for Big data. Nveo-Nat. Volatiles Essent. Oils J.|NVEO 2021, 8, 3997–4008. [Google Scholar]
  41. Li, H.; Yu, K.; Liu, B.; Feng, C.; Qin, Z.; Srivastava, G. An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things. IEEE J. Biomed. Health Inform. 2021, 26, 1949–1960. [Google Scholar] [CrossRef] [PubMed]
  42. Naaz, S.; Khan, S.A.; Siddiqui, F.; Sohail, S.S.; Madsen, D.; Ahmad, A. OdorTAM: Technology Acceptance Model for Biometric Authentication System Using Human Body Odor. Int. J. Environ. Res. Public Health 2022, 19, 6777. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Proposed workflow diagram.
Figure 1. Proposed workflow diagram.
Healthcare 11 00580 g001
Figure 2. Homomorphic encryption framework for data storage.
Figure 2. Homomorphic encryption framework for data storage.
Healthcare 11 00580 g002
Figure 3. Proposed CCRBM-based WO algorithm for disease detection.
Figure 3. Proposed CCRBM-based WO algorithm for disease detection.
Healthcare 11 00580 g003
Figure 4. Storage security analysis based on key generation time.
Figure 4. Storage security analysis based on key generation time.
Healthcare 11 00580 g004
Figure 5. Storage security analysis based on encryption time.
Figure 5. Storage security analysis based on encryption time.
Healthcare 11 00580 g005
Figure 6. Storage security analysis based on decryption time.
Figure 6. Storage security analysis based on decryption time.
Healthcare 11 00580 g006
Figure 7. Storage security analysis based on the security level.
Figure 7. Storage security analysis based on the security level.
Healthcare 11 00580 g007
Figure 8. Execution time-based performance analysis.
Figure 8. Execution time-based performance analysis.
Healthcare 11 00580 g008
Table 1. Literature analysis based on healthcare system.
Table 1. Literature analysis based on healthcare system.
Authors MethodsAdvantages Disadvantages
Elhoseny et al. [8]Hybrid security model (HSM)Secures the information safely and gradual increase in encrypted dataCapacity is increased for communication protocols
Mutlag et al. [9]Fog computing frameworkScalable and reliable for computingHigher complexities
Luo et al. [10]SW-SSSHigher security Collision should be avoided
Haghi et al. [11]Prototype for monitoring innovative wrist-worn and flexible IoT healthcareTransmitted efficiently in large observationsLess clinical analysis outcomes
Subramaniyaswamy et al. [12]ProTripAccuracy and efficiencyInterface will be upgraded
Shankar et al. [13]Hybrid encryption algorithmInformation and images are securedTamper localization
Thakur, et al. [14]TDTRobust in the transform techniqueWatermarking
Gupta et al. [15]Traditional Optimized Cuttlefish Algorithm (OCFA)Easily identify and implement the dataComplexity
Diaz-Cortes et al. [16]Dragon Algorithm (DA)Generate sharp bordersNot suitable for large dataset
Pavitra et al. [17]IoT-based environmentsOffered as a base for the development of the systemAn interoperability problems
Rajan Jeyaraj et al. [18]Deep learning modelAn accuracy rate of 97.2%Huge data dimensionality
Kumar et al. [19]Novel architectural frameworkGood data storage Higher computational time
Table 2. Simulation parameters.
Table 2. Simulation parameters.
Parameters Ranges
Number of input layers 5
Number of output layer 1
Learning rate 0.1
Size of the whale population 20
Iterations 100
Table 3. Comparative study based on metrics for prediction diseases.
Table 3. Comparative study based on metrics for prediction diseases.
Methods AccuracyPrecisionF1-MeasureRecall
HSM67.22%67.36%67.87%78.44%
SW-SSS79.45%76.6%79.98%80.89%
TDT88.78%86.56%81.34%81.37%
OCFA86.56%87.44%83.95%87.89%
Random Hashing Mechanism87.56%87.56%87.64%89.76%
Proposed 96.87%97.45%97.78%98.57%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Irshad, R.R.; Alattab, A.A.; Alsaiari, O.A.S.; Sohail, S.S.; Aziz, A.; Madsen, D.Ø.; Alalayah, K.M. An Optimization-Linked Intelligent Security Algorithm for Smart Healthcare Organizations. Healthcare 2023, 11, 580. https://doi.org/10.3390/healthcare11040580

AMA Style

Irshad RR, Alattab AA, Alsaiari OAS, Sohail SS, Aziz A, Madsen DØ, Alalayah KM. An Optimization-Linked Intelligent Security Algorithm for Smart Healthcare Organizations. Healthcare. 2023; 11(4):580. https://doi.org/10.3390/healthcare11040580

Chicago/Turabian Style

Irshad, Reyazur Rashid, Ahmed Abdu Alattab, Omar Ali Saleh Alsaiari, Shahab Saquib Sohail, Asfia Aziz, Dag Øivind Madsen, and Khaled M. Alalayah. 2023. "An Optimization-Linked Intelligent Security Algorithm for Smart Healthcare Organizations" Healthcare 11, no. 4: 580. https://doi.org/10.3390/healthcare11040580

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop