Deep Q-Learning-Based Neural Network with Privacy Preservation Method for Secure Data Transmission in Internet of Things (IoT) Healthcare Application

被引:34
作者
Kathamuthu, Nirmala Devi [1 ]
Chinnamuthu, Annadurai [2 ]
Iruthayanathan, Nelson [2 ]
Ramachandran, Manikandan [3 ]
Gandomi, Amir H. [4 ]
机构
[1] Kongu Engn Coll, Dept CSE, Erode 638060, Tamil Nadu, India
[2] Sri Sivasubramaniya Nadar Coll Engn, Dept ECE, Chennai 603110, Tamil Nadu, India
[3] SASTRA Deemed Univ, Sch Comp, Thanjavur 613401, Tamil Nadu, India
[4] Univ Technol Sydney, Data Sci Inst, Fac Engn & Informat Syst, Sydney, NSW 2007, Australia
关键词
healthcare; deep learning; privacy; Internet of Things (IoT); Q-learning; data transmission; INDUSTRIAL INTERNET; SCHEME;
D O I
10.3390/electronics11010157
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The healthcare industry is being transformed by the Internet of Things (IoT), as it provides wide connectivity among physicians, medical devices, clinical and nursing staff, and patients to simplify the task of real-time monitoring. As the network is vast and heterogeneous, opportunities and challenges are presented in gathering and sharing information. Focusing on patient information such as health status, medical devices used by such patients must be protected to ensure safety and privacy. Healthcare information is confidentially shared among experts for analyzing healthcare and to provide treatment on time for patients. Cryptographic and biometric systems are widely used, including deep-learning (DL) techniques to authenticate and detect anomalies, andprovide security for medical systems. As sensors in the network are energy-restricted devices, security and efficiency must be balanced, which is the most important concept to be considered while deploying a security system based on deep-learning approaches. Hence, in this work, an innovative framework, the deep Q-learning-based neural network with privacy preservation method (DQ-NNPP), was designed to protect data transmission from external threats with less encryption and decryption time. This method is used to process patient data, which reduces network traffic. This process also reduces the cost and error of communication. Comparatively, the proposed model outperformed some standard approaches, such as thesecure and anonymous biometric based user authentication scheme (SAB-UAS), MSCryptoNet, and privacy-preserving disease prediction (PPDP). Specifically, the proposed method achieved accuracy of 93.74%, sensitivity of 92%, specificity of 92.1%, communication overhead of 67.08%, 58.72 ms encryption time, and 62.72 ms decryption time.
引用
收藏
页数:14
相关论文
共 27 条
[1]   Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment [J].
Abirami, P. ;
Bhanu, S. Vijay .
SOFT COMPUTING, 2020, 24 (24) :18927-18936
[2]   A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization [J].
Ahamad, Danish ;
Hameed, Shabi Alam ;
Akhtar, Mobin .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (06) :2343-2358
[3]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[4]   Deep Learning-Based Privacy Preservation and Data Analytics for IoT Enabled Healthcare [J].
Bi, Hongliang ;
Liu, Jiajia ;
Kato, Nei .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (07) :4798-4807
[5]  
Buttyan L., 2008, SECURITY COOPERATION, P237
[6]   An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT [J].
Deebak, B. D. ;
Al-Turjman, Fadi ;
Aloqaily, Moayad ;
Alfandi, Omar .
IEEE ACCESS, 2019, 7 :135632-135649
[7]  
Guesmi R, 2014, I C COMP SYST APPLIC, P678, DOI 10.1109/AICCSA.2014.7073265
[8]  
Guo X., 2013, COMMUN NETWORK, V5, P584, DOI DOI 10.4236/CN.2013.53B2105
[9]   Towards Privacy-preserving Data Sharing in Smart Environments [J].
Hernandez-Ramos, Jose L. ;
Bernal Bernabe, Jorge ;
Skarmeta, Antonio F. .
2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, :334-339
[10]   Green Data Gathering under Delay Differentiated Services Constraint for Internet of Things [J].
Huang, Mingfeng ;
Liu, Anfeng ;
Wang, Tian ;
Huang, Changqin .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,