Design of an Iterative Method for Secure and Private IoT Healthcare Data Management Using Encrypted Federated Learning and AI-Driven Anomaly Detection

Authors

  • Sivanagaraju Vallabhuni, Kumar Debasis

Keywords:

Security, Homomorphic Encryption, Reinforcement Learning, Anomaly Detection, Predictive Analytics

Abstract

The escalating need for robust, privacy-preserving IoT Healthcare data management systems has prompted the exploration of security models that ensure non-mutability and stringent security. Traditional methods often fall short in effectively balancing privacy, accessibility, and computational efficiency. Addressing these limitations, this paper introduces a novel framework utilizing encrypted federated learning, access control, anomaly detection, and predictive analytics tailored for IoT Healthcare applications. Our proposed model comprises four innovative methods: Encrypted Federated Learning with Homomorphic Encryption (EFLHE), Reinforcement Learning-Driven Access Control (RLAC), AI-Driven Anomaly Detection with Autoencoder Fusion (AIDA), and timestamp Series-Based IoT Healthcare Forecasting with Grey Wolf Optimizer (TS-GWO). EFLHE harnesses homomorphic encryption to train machine learning models on encrypted data across multiple nodes, preserving patient confidentiality while enabling decentralized computation. This method overcomes the existing challenges of data privacy and computational overhead associated with traditional federated learning systems. Furthermore, RLAC employs reinforcement learning to dynamically optimize access control policies via smart contracts based on real-time interaction and system feedback, thus enhancing both security and user experience. This adaptive control mechanism significantly outperforms static access control systems in responding to evolving security threats and user requirements. In parallel, AIDA integrates autoencoders with AI-driven models to meticulously detect anomalies and potentially fraudulent activities within the network. By learning standard transaction patterns and identifying deviations, AIDA provides a dual-layer security framework that significantly reduces the risk of security breaches. Lastly, TS-GWO leverages the Grey Wolf Optimizer to refine the parameters of timestamp series forecasting models. This optimization facilitates more accurate predictions regarding disease progression, treatment outcomes, and resource allocation, which are critical for proactive IoT Healthcare management. Collectively, these methods not only fortify the security and privacy of IoT Healthcare data but also enhance the operational efficiency of IoT Healthcare systems. The impacts of this work are profound, offering a scalable, secure, and efficient framework for IoT Healthcare data management that meets the rigorous demands of modern IoT Healthcare infrastructures and compliance standards. This model sets a new benchmark for privacy-preserving, real-time IoT Healthcare data systems, potentially revolutionizing patient care through technologically advanced solutions that safeguard sensitive information and optimize clinical decision-making processes.

Downloads

Download data is not yet available.

References

S. Wang, X. Zhou, K. Wen, B. Weng and P. Zeng, "Security Analysis of a User Authentication Scheme for IoT-Based Healthcare," in IEEE Internet of Things Journal, vol. 10, no. 7, pp. 6527-6530, 1 April1, 2023, doi: 10.1109/JIOT.2022.3228921.

T. Alladi, V. Chamola and Naren, "HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks," in IEEE Journal on Selected Areas in Communications, vol. 39, no. 2, pp. 361-369, Feb. 2021, doi: 10.1109/JSAC.2020.3020605.

N. Taimoor and S. Rehman, "Reliable and Resilient AI and IoT-Based Personalised Healthcare Services: A Survey," in IEEE Access, vol. 10, pp. 535-563, 2022, doi: 10.1109/ACCESS.2021.3137364.

S. Zaman, M. R. A. Khandaker, R. T. Khan, F. Tariq and K. -K. Wong, "Thinking Out of the Blocks: Holochain for Distributed Security in IoT Healthcare," in IEEE Access, vol. 10, pp. 37064-37081, 2022, doi: 10.1109/ACCESS.2022.3163580.

M. A. Khatun, S. F. Memon, C. Eising and L. L. Dhirani, "Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation," in IEEE Access, vol. 11, pp. 145869-145896, 2023, doi: 10.1109/ACCESS.2023.3346320.

K. Wang, C. -M. Chen, Z. Tie, M. Shojafar, S. Kumar and S. Kumari, "Forward Privacy Preservation in IoT-Enabled Healthcare Systems," in IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 1991-1999, March 2022, doi: 10.1109/TII.2021.3064691.

M. Masud, G. S. Gaba, K. Choudhary, M. S. Hossain, M. F. Alhamid and G. Muhammad, "Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare," in IEEE Internet of Things Journal, vol. 9, no. 4, pp. 2649-2656, 15 Feb.15, 2022, doi: 10.1109/JIOT.2021.3080461.

S. Thapliyal, M. Wazid, D. P. Singh, A. K. Das, S. Shetty and A. Alqahtani, "Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications," in IEEE Access, vol. 11, pp. 93032-93047, 2023, doi: 10.1109/ACCESS.2023.3310264.

A. Agiollo, M. Conti, P. Kaliyar, T. -N. Lin and L. Pajola, "DETONAR: Detection of Routing Attacks in RPL-Based IoT," in IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1178-1190, June 2021, doi: 10.1109/TNSM.2021.3075496.

L. M. Halman and M. J. F. Alenazi, "MCAD: A Machine Learning Based Cyberattacks Detector in Software-Defined Networking (SDN) for Healthcare Systems," in IEEE Access, vol. 11, pp. 37052-37067, 2023, doi: 10.1109/ACCESS.2023.3266826.

K. M. Besher, Z. Subah and M. Z. Ali, "IoT Sensor Initiated Healthcare Data Security," in IEEE Sensors Journal, vol. 21, no. 10, pp. 11977-11982, 15 May15, 2021, doi: 10.1109/JSEN.2020.3013634.

S. S. Ahamad, M. Al-Shehri and I. Keshta, "A Secure and Resilient Scheme for Telecare Medical Information Systems With Threat Modeling and Formal Verification," in IEEE Access, vol. 10, pp. 120227-120244, 2022, doi: 10.1109/ACCESS.2022.3217230.

M. Adil, M. Attique, M. M. Jadoon, J. Ali, A. Farouk and H. Song, "HOPCTP: A Robust Channel Categorization Data Preservation Scheme for Industrial Healthcare Internet of Things," in IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7151-7161, Oct. 2022, doi: 10.1109/TII.2022.3148287.

A. N. Navaz, M. A. Serhani, H. T. El Kassabi, N. Al-Qirim and H. Ismail, "Trends, Technologies, and Key Challenges in Smart and Connected Healthcare," in IEEE Access, vol. 9, pp. 74044-74067, 2021, doi: 10.1109/ACCESS.2021.3079217.

J. Liu, J. Yang, W. Wu, X. Huang and Y. Xiang, "Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT," in IEEE Transactions on Computers, vol. 72, no. 5, pp. 1384-1395, 1 May 2023, doi: 10.1109/TC.2022.3207138.

S. Shihab and R. AlTawy, "Lightweight Authentication Scheme for Healthcare With Robustness to Desynchronization Attacks," in IEEE Internet of Things Journal, vol. 10, no. 20, pp. 18140-18153, 15 Oct.15, 2023, doi: 10.1109/JIOT.2023.3279035.

F. Alshehri and G. Muhammad, "A Comprehensive Survey of the Internet of Things (IoT) and AI-Based Smart Healthcare," in IEEE Access, vol. 9, pp. 3660-3678, 2021, doi: 10.1109/ACCESS.2020.3047960.

V. Gotarane, S. Abimannan, S. Hussain and R. R. Irshad, "A Hybrid Framework Leveraging Whale Optimization and Deep Learning With Trust-Index for Attack Identification in IoT Networks," in IEEE Access, vol. 12, pp. 36296-36310, 2024, doi: 10.1109/ACCESS.2024.3374691.

A. Ghourabi, "A Security Model Based on LightGBM and Transformer to Protect Healthcare Systems From Cyberattacks," in IEEE Access, vol. 10, pp. 48890-48903, 2022, doi: 10.1109/ACCESS.2022.3172432.

P. Gope, Y. Gheraibia, S. Kabir and B. Sikdar, "A Secure IoT-Based Modern Healthcare System With Fault-Tolerant Decision Making Process," in IEEE Journal of Biomedical and Health Informatics, vol. 25, no. 3, pp. 862-873, March 2021, doi: 10.1109/JBHI.2020.3007488.

S. Das, S. Namasudra, S. Deb, P. M. Ger and R. G. Crespo, "Securing IoT-Based Smart Healthcare Systems by Using Advanced Lightweight Privacy-Preserving Authentication Scheme," in IEEE Internet of Things Journal, vol. 10, no. 21, pp. 18486-18494, 1 Nov.1, 2023, doi: 10.1109/JIOT.2023.3283347.

M. Ali, F. Naeem, M. Tariq and G. Kaddoum, "Federated Learning for Privacy Preservation in Smart Healthcare Systems: A Comprehensive Survey," in IEEE Journal of Biomedical and Health Informatics, vol. 27, no. 2, pp. 778-789, Feb. 2023, doi: 10.1109/JBHI.2022.3181823.

M. Akter, N. Moustafa, T. Lynar and I. Razzak, "Edge Intelligence: Federated Learning-Based Privacy Protection Framework for Smart Healthcare Systems," in IEEE Journal of Biomedical and Health Informatics, vol. 26, no. 12, pp. 5805-5816, Dec. 2022, doi: 10.1109/JBHI.2022.3192648.

N. Mishra and S. Pandya, "Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review," in IEEE Access, vol. 9, pp. 59353-59377, 2021, doi: 10.1109/ACCESS.2021.3073408.

A. Guesmi, M. A. Hanif, B. Ouni and M. Shafique, "Physical Adversarial Attacks for Camera-Based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook," in IEEE Access, vol. 11, pp. 109617-109668, 2023, doi: 10.1109/ACCESS.2023.3321118.

Downloads

Published

12.06.2024

How to Cite

Sivanagaraju Vallabhuni. (2024). Design of an Iterative Method for Secure and Private IoT Healthcare Data Management Using Encrypted Federated Learning and AI-Driven Anomaly Detection. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 2421 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6650

Issue

Section

Research Article