Opportunistic access control scheme for enhancing IoT-enabled healthcare security using blockchain and machine learning.

Journal: Scientific reports
PMID:

Abstract

The healthcare industry, aided by technology, leverages the Internet of Things (IoT) paradigm to offer patient/user-related services that are ubiquitous and personalized. The authorized repository stores ubiquitous data for which access-level securities are granted. These security measures ensure that only authorized entities can access patient/user health information, preventing unauthorized entries and data downloads. However, recent sophisticated security and privacy attacks such as data breaches, data integrity issues, and data collusion have raised concerns in the healthcare industry. As healthcare data grows, conventional solutions often fail due to scalability concerns, causing inefficiencies and delays. This is especially true for multi-key authentication. Dependence on conventional access control systems leads to security flaws and authorization errors caused by static user behaviour models. This article introduces an Opportunistic Access Control Scheme (OACS) for leveraging access-level security. This approach is a defendable access control scheme in which the user permissions are based on their requirement and data. After accessing the healthcare record, a centralized IoT security augmentation and assessment is provided. The blockchain records determine and revoke the access grant based on previous access and delegation sequences. This scheme analyses the possible delegation methods for providing precise users with interrupt-free healthcare record access. The blockchain recommendations are analyzed using a trained learning paradigm to provide further access and denials. The proposed method reduces false rates by 11.74%, increases access rates by 13.1%, speeds up access and processing by 12.36% and 13.23%, respectively, and reduces failure rates by 9.94%. The OACS decreases false rates by 10.64%, processing time by 15.62%, and failure rates by 10.95%.

Authors

  • Mohd Anjum
    Department of Computer Engineering, Aligarh Muslim University, Aligarh, India.
  • Naoufel Kraiem
    College of Computer Science, King Khalid University, Abha, Saudi Arabia.
  • Hong Min
    Technical Center for Industrial Product and Raw Material Inspection and Testing of Shanghai Customs, Shanghai 200135, China. liu_shu@customs.gov.cn.
  • Ashit Kumar Dutta
    Department of Computer Science and Information Systems, College of Applied Sciences, Almaarefa University, Riyadh 11597, Saudi Arabia.
  • Yousef Ibrahim Daradkeh
    Department of Computer Engineering and Information, College of Engineering in Wadi Alddawasir, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia.
  • Sana Shahab
    Department of Business Administration, College of Business Administration, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.