A Robust Framework for Ensuring Data Confidentiality and Security in Modern Healthcare Networks


  • Muzammil Hussain Global College of Engineering and Technology,Muscat – 112, Oman
  • Nadeem Akhtar Global College of Engineering and Technology,Muscat – 112, Oman
  • Raza Hasan Science and Eng , Solent University, Southhampton – SO140YN,UK


Data security in healthcare, homomorphic-encryption, differential-privacy, federated-learning


The potential implementation of extensive data sharing in dispersed network systems is likely to give rise to concerns surrounding privacy, secrecy, and authentication inside the realm of cyberspace. The main objective of this work is to safeguard the privacy and confidentiality of data inside an unsecured environment during the exchange of audiovisual content between two Internet of Things (IoT) nodes. To effectively counteract an adversary and guarantee the confidentiality of data, we suggest the implementation of a resilient multi-level security strategy that relies on the principles of information hiding and chaos theory. While certain block-based resilient data concealing strategies based on the transform domain have demonstrated favorable outcomes, their suboptimal block and coefficient selection processes lead to inadequate performance against prevalent cyber-attacks. Therefore, we propose a Robust Framework for Ensuring Data Confidentiality and Security in EHR-based networks using federated-learning with homomorphic-encryption. A differential-privacy technique is used here to increase privacy, which entails adding noise to the aggregated model update. The suggested model outperforms the most recent techniques for data security and secrecy in networks based on electronic health records.


Download data is not yet available.


R. Agrawal and S. Prabakaran, “Big data in digital healthcare: lessons learnt and recommendations for general practice,” -Heredity, Vol.-124, no. 4, pp. 525-534, 2020.

P. Muralidhara, “IoT applications in cloud computing for smart devices,” International Journal of Computer Science Technology, Vol.-1, no. 1, pp. 1-41, 2017.

B. Sharma and M. S. Obaidat, “Comparative analysis of IoT based products, technology and integration of IoT with cloud computing,” IET Networks, Vol.-9, no. 2, pp. 43-47, 2020.

R. Arshad, et al., “Green IoT: An investigation on energy saving practices for 2020 and beyond,”IEEE Access, Vol.-- 5, pp. 15667-15681, 2017.

G. Lulla, et al., “IoT based smart security and surveillance system,” in 2021 international conference on emerging smart computing and informatics (ESCI), 2021, pp. 385-390: IEEE.

M. Valinejadshoubi, et al., “Development of an IoT and BIM-based automated alert system for thermal comfort monitoring in buildings,”Sustainable Cities, Vol.- 66, p. 102602, 2021.

S. S. Vedaei et al., “COVID-SAFE: An IoT-based system for automated health monitoring and surveillance in post-pandemic life,”IEEE access, Vol.- 8, pp. 188538-188551, 2020.

D. Mrňa, B. Badánik, and A. Novák, “Internet of things as an optimization tool for smart airport concept,”European Transport-Trasporti Europei, Vol.- 82, 2021.

S. A. ElRahman and A. S. Alluhaidan, “Blockchain technology and IoT-edge framework for sharing healthcare services,”Soft Computing, Vol.- 25, no. 21, pp. 13753-13777, 2021.

J. L. Shah, et al., “Integration of Cloud and IoT for smart e-healthcare,” in Healthcare paradigms in the internet of things ecosystem: Elsevier, 2021, pp. 101-136.

L. Sha, F. Xiao, W. Chen, and J. Sun, “IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT,”World Wide Web, Vol.- 21, pp. 59-88, 2018.

L. D. Serbanati, “Health digital state and Smart EHR systems,”Informatics in Medicine Unlocked, Vol.- 21, p. 100494, 2020.

W. Bani Issa et al., “Privacy, confidentiality, security and patient safety concerns about electronic health records,”International nursing review, Vol.- 67, no. 2, pp. 218-230, 2020.

M. Mahmud, M. S. Kaiser, T. M. McGinnity, and A. J. C. c. Hussain, “Deep learning in mining biological data,” Vol.- 13, pp. 1-33, 2021.

M. J. Bowie, "Understanding Current Procedural Terminology and HCPCS Coding Systems," 2021. Cengage Learning, 2021.

J. Xu, et al., “A survey of deep learning for electronic health records,”Applied Sciences, Vol.- 12, no. 22, p. 11709, 2022.

S. K. Tayebati, et al.,, “Identification of World Health Organisation ship’s medicine chest contents by Anatomical Therapeutic Chemical (ATC) classification codes,”International maritime health, Vol.- 68, no. 1, pp. 39-45, 2017.

N. N. Basil, S. et al., “Health Records Database and Inherent Security Concerns: A Review of the Literature,”Cureus, Vol.- 14, no. 10, 2022.

S. Qu, “Combining Structured and Unstructured Data in Electronic Health Record for Readmission Prediction via Deep Learning,” The Ohio State University, 2020.

I. Li et al., “Neural natural language processing for unstructured data in electronic health records: A review,”Computer Science Review, Vol.- 46, p. 100511, 2022.

S. Qamar, “Healthcare data analysis by feature extraction and classification using deep learning with cloud based cyber security,”Computers Electrical Engineering, Vol.- 104, p. 108406, 2022.

D. Zhang, et al., “Combining structured and unstructured data for predictive models: a deep learning approach,”BMC medical informatics decision making, Vol.- 20, no. 1, pp. 1-11, 2020.

Y. Zhang, et al., “LEAP: learning to prescribe effective and safe treatment combinations for multimorbidity,” in proceedings of the 23rd ACM SIGKDD international conference on knowledge Discovery and data Mining, 2017, pp. 1315-1324.

C. Su, et al., “GATE: graph-attention augmented temporal neural network for medication recommendation,”IEEE Access, Vol.-8, pp. 125447-125458, 2020.

A. Ponselvakumar et al., “Advancement in precision medicine and recommendation system for clinical trials using deep learning methods,” in IOP conference series: materials science and engineering, 2021, Vol.-1055, no. 1, p. 012110: IOP Publishing.

G. Zhang, et al., “Identifying fraud in medical insurance based on blockchain and deep learning,” Future Generation Computer Systems, Vol.- 130, pp. 140-154, 2022.

[27]A. Meyer et al., “Machine learning for real-time prediction of complications in critical care: a retrospective study,”The Lancet Respiratory Medicine, Vol.- 6, no. 12, pp. 905-914, 2018.

S. Silvestri, et al., “A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem,” Sensors, Vol.- 23, no. 2, p. 651, 2023.

L. Priya, et al., “Deep Learning in Healthcare,” Deep Learning Edge Computing Solutions for High Performance Computing, pp. 121-133, 2021.

D. Berdik, et al., “A survey on blockchain for information systems management and security,” Information Processing Management, Vol.- 58, no. 1, p. 102397, 2021.

X. Zhang, J. Ding, M. Wu, S. T. Wong, H. Van Nguyen, and M. Pan, “Adaptive privacy preserving deep learning algorithms for medical data,” in Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2021, pp. 1169-1178.

J. A. Alzubi, et al., “Cloud-IIoT-based electronic health record privacy-preserving by CNN and blockchain-enabled federated-learning ,” IEEE Transactions on Industrial Informatics, Vol.- 19, no. 1, pp. 1080-1087, 2022.

J. Paul, et al., A. Al Badawi, B. Veeravalli, and K. M. M. Aung, “Privacy-preserving collective learning with homomorphic-encryption,”IEEE Access, Vol.- 9, pp. 132084-132096, 2021.

B. K. Beaulieu-Jones, et al., “Privacy-preserving distributed deep learning for clinical data,” arXiv preprint arXiv:.01484, 2018.

G. Kaissis et al., “End-to-end privacy preserving deep learning on multi-institutional medical imaging,”Nature Machine Intelligence, Vol.- 3, no. 6, pp. 473-484, 2021.

A. Fejza, et al., “Scalable and interpretable predictive models for electronic health records,” in 2018 IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA), 2018, pp. 341-350: IEEE.




How to Cite

Hussain, M. ., Akhtar, N. ., & Hasan, R. . (2024). A Robust Framework for Ensuring Data Confidentiality and Security in Modern Healthcare Networks. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 128–137. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5230



Research Article