Security of Blockchain and AI-Empowered Smart Healthcare: Application-Based Analysis

被引:28
作者
Alabdulatif, Abdulatif [1 ]
Khalil, Ibrahim [2 ]
Rahman, Mohammad Saidur [2 ]
机构
[1] Qassim Univ, Coll Comp, Dept Comp Sci, Buraydah 52571, Saudi Arabia
[2] RMIT Univ, Sch Sci, Comp Sci & Software Engn, Melbourne, Vic 3000, Australia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 21期
关键词
smart healthcare systems; security; data privacy; Internet of things; blockchain; wearable devices; medical devices; DEEP LEARNING-MODEL; UAV; PROTOCOL; SYSTEM; FOG; TECHNOLOGIES; INTERNET; PLATFORM; SCHEME; ISSUES;
D O I
10.3390/app122111039
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
A smart device carries a great amount of sensitive patient data as it offers innovative and enhanced functionalities in the smart healthcare system. Moreover, the components of healthcare systems are interconnected via the Internet, bringing significant changes to the delivery of healthcare services to individuals. However, easy access to healthcare services and applications has given rise to severe risks and vulnerabilities that hamper the performance of a smart healthcare system. Moreover, a large number of heterogeneous devices accumulate data that vary in terms of size and formats, making it challenging to manage the data in the healthcare repository and secure it from attackers who seek to profit from the data. Thus, smart healthcare systems are susceptible to numerous security threats and risks, such as hardware and software-based attacks, system-level attacks, and network attacks that have the potential to place patients' lives at risk. An analysis of the literature revealed a research gap in that most security surveys on the healthcare ecosystem examined only the security challenges and did not explore the possibility of integrating modern technologies to alleviate security issues in the smart healthcare system. Therefore, in this article, we conduct a comprehensive review of the various most recent security challenges and their countermeasures in the smart healthcare environment. In addition, an artificial intelligence (AI) and blockchain-based secure architecture is proposed as a case study to analyse malware and network attacks on wearable devices. The proposed architecture is evaluated using various performance metrics such as blockchain scalability, accuracy, and dynamic malware analysis. Lastly, we highlight different open issues and research challenges facing smart healthcare systems.
引用
收藏
页数:32
相关论文
共 115 条
[1]   Blockchain-Envisioned UAV Communication Using 6G Networks: Open Issues, Use Cases, and Future Directions [J].
Aggarwal, Shubhani ;
Kumar, Neeraj ;
Tanwar, Sudeep .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5416-5441
[2]   5G-Based Smart Healthcare Network: Architecture, Taxonomy, Challenges and Future Research Directions [J].
Ahad, Abdul ;
Tahir, Mohammad ;
Yau, Kok-Lim Alvin .
IEEE ACCESS, 2019, 7 :100747-100762
[3]   New secure healthcare system using cloud of things [J].
Al Alkeem, Ebrahim ;
Shehada, Dina ;
Yeun, Chan Yeob ;
Zemerly, M. Jamal ;
Hu, Jiankun .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03) :2211-2229
[4]   A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems [J].
Algarni, Abdullah .
IEEE ACCESS, 2019, 7 :101879-101894
[5]   Precision Clinical Medicine Through Machine Learning: Using High and Low Quantile Ranges of Vital Signs for Risk Stratification of ICU Patients [J].
Alghatani, Khalid ;
Ammar, Nariman ;
Rezgui, Abdelmounaam ;
Shaban-Nejad, Arash .
IEEE ACCESS, 2022, 10 :52418-52430
[6]   HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Naren .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (02) :361-369
[7]   A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware [J].
Almashhadani, Ahmad O. ;
Kaiiali, Mustafa ;
Sezer, Sakir ;
O'Kane, Philip .
IEEE ACCESS, 2019, 7 :47053-47067
[8]   Character-level word encoding deep learning model for combating cyber threats in phishing URL detection [J].
Alshehri, Mohammed ;
Abugabah, Ahed ;
Algarni, Abdullah ;
Almotairi, Sultan .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
[9]  
Ananthi J. Vijitha, 2021, 2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA), P37, DOI 10.1109/ICIRCA51532.2021.9545052
[10]  
[Anonymous], What Is Endpoint Detection and Response