Elevating security and disease forecasting in smart healthcare through artificial neural synchronized federated learning

被引:3
作者
Hai, Tao [1 ,2 ,3 ]
Sarkar, Arindam [4 ]
Aksoy, Muammer [5 ,6 ]
Karmakar, Rahul [7 ]
Manna, Sarbajit [4 ]
Prasad, Amrita [8 ]
机构
[1] Qiannan Normal Univ Nationalities, Sch Comp & Informat, Duyun 558000, Guizhou, Peoples R China
[2] Guizhou Univ, State Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
[3] INTI Int Univ, Fac Data Sci & Informat Technol, Nilai 71800, Malaysia
[4] Ramakrishna Mission Vidyamandira, Dept Comp Sci & Elect, Howrah 711202, West Bengal, India
[5] Al Mustaqbal Univ, Coll Sci, Cyber Secur Dept, Babylon 51001, Iraq
[6] Ahmed Bin Mohammed Mil Coll, Comp Informat Syst Dept, Doha 22988, Qatar
[7] Univ Burdwan, Dept Comp Sci, Burdwan 713104, West Bengal, India
[8] Cardiff Metropolitan Univ, Cardiff Sch Technol, Dept Data Sci, Cardiff CF5 2YB, Wales
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 06期
基金
中国国家自然科学基金;
关键词
Federated learning; Blockchain; Electronic health record (EHR); Internet of Medical Things (IoMT); Artificial neural networks (ANNs); INDUSTRIAL INTERNET; CHALLENGES; PREDICTION; SCHEME;
D O I
10.1007/s10586-024-04356-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting patient privacy has become a top priority with the introduction of Healthcare 5.0 and the growth of the Internet of Things. This study provides a revolutionary strategy that makes use of blockchain technology, information fusion, and federated illness prediction and deep extreme machine learning to meet the difficulties with regard to healthcare privacy. The suggested framework integrates several innovative technologies to make healthcare systems safe and privacy-preserving. The framework leverages the blockchain system, a distributed and unchangeable ledger, to secure the integrity, traceability and openness of private medical information. Patient privacy is better protected as a result, and there is less chance of data breaches or unauthorized access. The system makes use of the Linear Discriminant Analysis (LDA), Decision Tree, Extra Tree Classifier, AdaBoost, and Federated Deep Extreme Machine Learning algorithms to increase the accuracy and efficacy of illness prediction. This method allows for collaborative learning across many healthcare organizations without disclosing raw data, protecting privacy. The system obtains a thorough awareness of patient health, allowing for the early diagnosis of diseases and the development of individualized treatment suggestions. To further detect and reduce possible security risks in the IoMT environment, the framework also includes intrusion detection methods. Protecting patient data and infrastructure, the system can quickly identify and react to unauthorized actions or threats. High accuracy and privacy protection are shown by the results, making it appropriate for Healthcare 5.0 applications. The findings have important ramifications for researchers, politicians, and healthcare professionals who are seeking to develop safe and privacy-conscious healthcare systems.
引用
收藏
页码:7889 / 7914
页数:26
相关论文
共 67 条
[1]   Modeling, Simulation and Optimization of Power Plant Energy Sustainability for IoT Enabled Smart Cities Empowered With Deep Extreme Learning Machine [J].
Abbas, Sagheer ;
Khan, Muhammad Adnan ;
Eduardo Falcon-Morales, Luis ;
Rehman, Abdur ;
Saeed, Yousaf ;
Zareei, Mahdi ;
Zeb, Asim ;
Mohamed, Ehab Mahmoud .
IEEE ACCESS, 2020, 8 :39982-39997
[2]   Review Federated Learning for intrusion detection system: Concepts, challenges and future directions [J].
Agrawal, Shaashwat ;
Sarkar, Sagnik ;
Aouedi, Ons ;
Yenduri, Gokul ;
Piamrat, Kandaraj ;
Alazab, Mamoun ;
Bhattacharya, Sweta ;
Maddikunta, Praveen Kumar Reddy ;
Gadekallu, Thippa Reddy .
COMPUTER COMMUNICATIONS, 2022, 195 :346-361
[3]   Peer-to-peer energy trading among smart homes [J].
Alam, Muhammad Raisul ;
St-Hilaire, Marc ;
Kunz, Thomas .
APPLIED ENERGY, 2019, 238 :1434-1443
[4]   A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks [J].
Alkadi, Osama ;
Moustafa, Nour ;
Turnbull, Benjamin ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12) :9463-9472
[5]   A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things [J].
Alwarafy, Abdulmalik ;
Al-Thelaya, Khaled A. ;
Abdallah, Mohamed ;
Schneider, Jens ;
Hamdi, Mounir .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4004-4022
[6]   Predicting Moral Elevation Conveyed in Danmaku Comments Using EEGs [J].
Bao, Chenhao ;
Hu, Xin ;
Zhang, Dan ;
Lv, Zhao ;
Chen, Jingjing .
CYBORG AND BIONIC SYSTEMS, 2023, 4
[7]   Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications [J].
Bhavin, Makwana ;
Tanwar, Sudeep ;
Sharma, Navneet ;
Tyagi, Sudhanshu ;
Kumar, Neeraj .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 56
[8]   A Blockchain-Based Federated Learning Method for Smart Healthcare [J].
Chang, Yuxia ;
Fang, Chen ;
Sun, Wenzhuo .
COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2021, 2021
[9]   The causal effect of delivery volume on severe maternal morbidity: an instrumental variable analysis in Sichuan, China [J].
Chen, Nan ;
Pan, Jay .
BMJ GLOBAL HEALTH, 2022, 7 (05)
[10]   The Impact of the TPM Weights Distribution on Network Synchronization Time [J].
Dolecki, Michal ;
Kozera, Ryszard .
COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, 2015, 9339 :451-460