Professional Documents
Culture Documents
s11042-023-18043-5
s11042-023-18043-5
https://doi.org/10.1007/s11042-023-18043-5
Abstract
E-health has emerged as a key research area as long as the advent of the Internet of Things
(IoT). Maintaining patients’ privacy seems complex because patient data is so sensitive. In
medical uses, patient health information is often kept in the cloud, which bounds the user’s
ability to fully control their data. To overcome the issues of privacy and security, medi-
cal data is collected from IoT sensors embedded in patients to the Personal Digital Assis-
tant (PDA) for further processing. A hybrid encryption algorithm is used to ensure data
security during transmission from the gathered medical-related data. The encrypted report
is deposited in the cloud for later retrieval with appropriate access controls and encryp-
tion mechanisms in place. The use of blockchain for transmitting encrypted data further
enhances the transmission of data securely and reduces the risk of data breaches. The gen-
eration of encryption and decryption keys using a hybrid deep learning model (LSTM and
CNN) ensures the uniqueness and robustness of the keys. The selection of the optimal key
using the Self-Improved Lion Optimization Algorithm (SI-LA) ensures the efficiency and
effectiveness of the encryption and decryption process. Moreover, the execution of the
model is equated with the existing technology; therefore, the proposed model is ensured
as a more effective technique than the existing technique in terms of performance metrics.
Keywords Privacy · Security · IoT · Medical data · Blockchain · Hybrid deep learning
1 Introduction
Many nations are struggling with a drastic improvement in the count of patients, and it
seems more challenging for patients to access basic doctors [1]. Medical security is a cru-
cial component of personal privacy evidence, and its confidentiality is a valuable resource
for individuals [2]. In the normal manner, most medical behaviours are largely connected to
13
Vol.:(0123456789)
Multimedia Tools and Applications
the hospitals and dispensaries, and personal health data of individuals is frequently kept in
an electronic format of these organizations lacking "desensitization processing". There are
many risks to the security of these privacy data, including the possibility that they will be
used for academic research without desensitization, published to unauthorized web pages,
or collected by other agencies through unrecognized channels. These risks can seriously
harm people’s privacy and have an adverse impact on their physical and mental health as
well as their property [3]. In recent years, privacy has become a serious issue. Private infor-
mation is that about a person that cannot be revealed to others and is referred to as privacy.
Individuals’ physical, psychological, and financial health may all suffer if their personal
information is disclosed [4]. There are four different types of privacy: 1) concealment of
personal data, 2) privacy of Personal actions, 3) privacy of Private conversations, and 4)
confidentiality of the person [5].
IoT is little by little beginning to permeate healthcare, benefiting equally patients and
doctors. In medical facilities and even residences, IoT sensors can be utilized to track
patients, making it the key enabler in the medical field to its comprehensive improvements
in patient engagement [6]. To overcome the security issues, IoT needs identity authentica-
tion mechanisms [7] and protection of the confidentiality of the data. The three fundamen-
tal components of security are data availability, confidentiality, and integrity [8]. The main
intention of data confidentiality is to protect the privacy of sensitive details [9] by using
some mechanisms and avoiding unauthorized access. Data confidentiality for Internet of
Things devices means that the information gathered by the sensors shouldn’t be sent to an
unauthorized operator. Data confidentiality is ensured through the use of data encryption.
wherein the encrypted data transforms into cipher text and the data is difficult for unauthor-
ized users to access. The Wireless Sensor Network (WSN) nodes in the IoT system encrypt
data before sending it to the gateway [10]. The challenge is that unauthorised access from
within the network or system as well as external attackers must be prevented to be able to
protect the security and confidentiality of medical evidence. Therefore, new approaches,
designs, or computing models might be required to address private and assurance issues in
the area of sharing medical data [11, 12].
The majority of hospitals and healthcare organizations opt to construct their wellness
systems in a locked domain with a protective perimeter, such as a private network with
firewalls, to improve security safeguards and prevent privacy leakage [13, 14]. As a result,
there are now numerous healthcare institutions with scattered medical data silos, making it
difficult to conduct collaborative medical research and healthcare [15]. Finally, privacy and
security of IoT-medical data are crucial to protect patient secrecy, prevent data breaches,
and ensure safe and reliable healthcare delivery in cloud [26]. Robust security measures
such as encryption and access controls, must be implemented to safeguard IoT medical
data. Deep learning techniques can improve the privacy and security of IoT-medical data
by analyzing complicated patterns and data. In order to protect sensitive medical data from
illegal access and cyber threats, they are essential for producing strong encryption keys,
enhancing anomaly detection by identifying unusual data access patterns, and enabling
proactive threat mitigation through real-time monitoring [27, 28].
The suggested research work’s main benefits are listed below:
• To ensure secure transmission of medical data collected from IoT sensors embedded in
patients to the Personal Digital Assistant (PDA) for further processing.
• To encrypt the collected medical data using a hybrid encryption algorithm
(AES + Blowfish) to ensure data security during transmission.
13
Multimedia Tools and Applications
• To store the encrypted data in the cloud for later retrieval with appropriate access con-
trols and encryption mechanisms in place.
• To use blockchain for transmitting the encrypted data to further enhance the security of
dissemination of data and reduce the risk of data breaches.
• To generate encryption and decryption keys using a hybrid deep learning model (LSTM
and CNN) to ensure the uniqueness and robustness of the keys.
• To select the optimal key using the Self-Improved Lion Optimization Algorithm (SI-
LA) to ensure the efficiency and effectiveness of the encryption and decryption pro-
cess.
• To preserve the Safety and security of patient information and prevent unauthorized
access to medical data.
The remainder section of this paper is ordered as: Section 2 of the paper examines the
existing works that have been accomplished. Section 3 portrays information on the proposed
methodology for Privacy and Security of IoT-Medical Data. The results gained with the pro-
posed model is discussed thoroughly in Section 4. In Section 5, this paper is finalized.
2 Literature review
In 2021, Zouka et al. [16] showed a light authentication method scheme that provides for
safe interactions and safeguards personal health information. A bettered intelligent patient
supervision model that necessity analysed the patient’s critical bodily processes was used
in a test setup to interpret signals from medical devices using fuzzy inference. The platform
enables doctors to keep patients’ bio-signals up to date and it was outfitted with a rescue
missions system using a remote health app and M2M patient observing display.
In 2022, Mohiyuddin et al. [17] introduced a novel Adaptive Neuro-Fuzzy Inference Sys-
tem (ANFIS) for data defence to enhance and examine the level of security including viola-
tion, statistics integrity, etc. in order to securely save the evidence in the cloud. According to
the findings, the KNN classifier could also be used to categorise various types of medicinal
data could be accustomed to enhance and improve the trail to the cloud for safe data memory.
In 2019, Dwivedi et al. [18] presented a novel hybrid approach that combined the ben-
efits of the blockchain, the private key, and Various additional lightweight cryptographic
primitives to create a patient-centric access management for medical data stored electroni-
cally. Also pose unanswered questions in an effort to lessen various attacks, including DoS
and modification abuses.
In 2020, Stamatellis et al. [19] introduced PREHEALTH, a distributed ledger technol-
ogy and Identity Mixer-based EHR management solution that protects patient privacy. The
permissioned blockchain framework was used in the proof-of-concept implementation.
The suggested method effectively stores patient records while keeping confidentiality and
unlinkability. The effectiveness and viability of the plan for deployment on a large scale in
the real world were demonstrated by experimental performance evaluation results.
In 2020, Almaiah et al. [20] put forth the BFCP protocol as a solution to the issue of
reactive medical information privacy when using the Deep Learning method. The formal-
ities allowed for data security while maintaining high classification accuracy. To recog-
nize the importance of the model, the creativity outcomes were also contrasted with those
from benchmark models. When evaluated against benchmark models, the suggested model
shows remarkable progress in terms of comparative parameters.
13
Multimedia Tools and Applications
In 2021, Ali et al. [21] developed a novel security way that offered both security with
privacy that significantly greater proficiency and at a lower expenditure. Also, put forth a
patient healthcare framework, in comparison to current blockchain-based access control
offered greater security, dependability, and authentication.
In 2021, Ngabo et al. [22] suggested a public-permissioned blockchain security mecha-
nism by utilizing an elliptic curve cryptographic (ECC) digital signature that works with a
distributed ledger server in order to offer an immutable security remedy, transaction trans-
parency, and guard against the alteration of patient records at the IoTs fog layer. Those
problems with scalability, centralization, and latency in the fog model were also lessened
by the blockchain technology approach.
In 2020, Jyotheeswari et al. [23] created a framework for handling the enormous
amounts of medical data produced by the sensor nodes. In both routine and emergency
situations, the architecture would enable secure data sharing between physicians and
patients. Make a security mechanism suggestion as a next step to enhance data integrity
and confidentiality. The performance was achieved by the suggested mechanism using both
attribute-based and symmetric encryption. The outcomes of the simulation show that the
suggested system was effective.
In 2021, Bi et al. [24] created a deep learning-based data analytics and privacy preser-
vation system for IoT-enabled healthcare. Gather raw data from the users and keep their
privacy information separate in a privacy-isolation area. Using a convolutional neural net-
work to build a delicate security module, analyzed health-related data in the cloud with-
out knowing the privacy details of the users. Also, put the prototype system into use and
assessed it, and numerous tests showed that it was reliable and effective.
In 2019, Din et al. [25] tried to offer a thorough evaluation of the IoMT research efforts.
First, gave a general overview of the IoMT framework. Also gave a thorough overview
of IoMT-related applications that have been created and/or implemented over the past ten
years. The implementation of the suggested methods faces several difficulties, including
those relevant to the cost and security of the equipment and the confidentiality of patient
information. Table 1 shows the various authors of research gaps.
2.1 Research gaps
The lot of benefit of IoT sensors in the medical industry to collect patient data has led to the
creation of massive amounts of sensitive health information that must be securely stored
and transmitted. However, this poses a significant challenge as the data can be intercepted
or accessed by unauthorized entities, potentially leading to privacy breaches and harm to
patients. Accordingly, there is a quick shortage to develop robust preserving confidentiality
mechanisms for IoT-medical data that ensure data confidentiality, integrity, and availability
while maintaining accessibility to authorized personnel. The challenge is to strike a bal-
ance between the benefits of using IoT-medical data for research and healthcare advance-
ments while ensuring the protection of patient privacy and confidentiality.
The drawbacks and the ways to overcome them: -
The absence of common security procedures across various IoT devices and platforms
presents a serious obstacle to protecting the privacy and security of IoT-related medical
data. Medical IoT devices frequently come from different manufacturers, and they might
not all follow the same security requirements. The implementation of consistent security
measures might be difficult due to this heterogeneity, which can lead to vulnerabilities.
Establishing interoperability standards for IoT devices in healthcare is done by regulatory
13
Table 1 Various author’s reviews about research gaps
Author Aim Research gaps
Chen et al. [2] Medical Service Framework and Secure Storage for Blockchain-Based • Benefits and disadvantages are not analysed
Medical Records • The medical data safety management schedule is not better
Fan et al. [3] IoT’s in Medical Privacy Protection • RFID systems usage in the healthcare industry is unfocused
Multimedia Tools and Applications
13
Multimedia Tools and Applications
agencies and business associations. To provide seamless integration while ensuring secu-
rity, these specifications may include security standards that all devices must adhere to.
3 Proposed methodology
Figure 1 shows the overall structure of the suggested methodology. Blockchain is used to
store hashes of users’ medical information as well as their data access policies. Who can
access the users’ data is determined by the policies. Seven modules of the system model
are as follows:
13
Multimedia Tools and Applications
13
Multimedia Tools and Applications
all built on software that assists workers by providing scheduling, prompts, and guidance
while automatically recording the specifics of this activity and other data via cloud storage.
The focus of digital transformation in healthcare has largely been on developments that
directly support patient care. Electronic patient records, video conferencing appointments,
wearable health monitoring technology, and online information portals have all emerged
recently. PDAs have the capacity to carry out demanding operations like cryptographic
operations and packet transmission.
iii. IoT health manager
IoT-equipped gadgets have made it possible to track remotely patients in the healthcare
division, unleashing the possibilities to continue patient secure and wellness and enabling
medical professionals to rescue top-notch care. Patient engagement and satisfaction have
increased as a result of easier and more efficient doctor communication. Remote health sur-
veillance for patients also reduces hospital stays’ duration and helps prevent readmissions.
The Internet of Things significantly improves patient outcomes while reducing healthcare
expenses. The provision of medical assistance is being radically changed by the IoT by
redefining the space of device and human interaction. With the aid of wearable gadgets
like fitness bands and other wirelessly affiliated devices patients can access individualised
care. These devices can be set up to remind users to monitor changes in their blood pres-
sure, events, and a category of other things. IoT has transformed people’s lives by making
it possible to incessantly track medical conditions, exceptionally those of elderly patients.
An individual’s alert system alerts concerned relations and medical professionals of any
variations or problems to their Repeated actions.
Besides keeping track of the patient’s fitness, IoT devices in hospitals can be used
for a various other objective. Using IoT devices tagged with sensors, the real-time loca-
tion of medical equipment is tracked. The emplacement of medical personnel at dif-
ferent sites can also be reviewed instantly. Hospital patients are very distressed about
the spread of infections. IoT-enabled hygiene supervision devices can help obstruct
patient illness. Additionally, IoT tools are helpful for asset governance tasks like manag-
ing pharmacy inventory, checking the temperature in the refrigerator, and protecting the
environment temp and humidity.
iv. Hospitals and health centres
All of a country’s health centres may be added to the hospitals and health centres
section. They oversee the BC network, miners, and user data. They get user data and
policy hashes from IHMs and store them. They are in charge of:
• Registering users and assignment to each of them a health wallet that could be used
to announce with the BC network.
• Giving each patient access to a cluster miner.
13
Multimedia Tools and Applications
The following areas of the healthcare sector are assisted by cloud-based healthcare
solutions:
• Improved data monitoring and analysis for the diagnosis and treatment of various dis-
eases
• Massive storage capacity for radiology images and EHR (Electronic Health Record)
datasets
• Access to computing resources that is available on demand
• Sharing of EHR among only authorised medical professionals, practitioners, and hos-
pitals in various parts of the world, enabling timely access to information essential for
lifesaving and minimising the need for additional testing
• More accurate data analysis
• Improved monitoring of patient health data
13
Multimedia Tools and Applications
Step 1: Secure transmission: Achieving the main goal is to ensure secure transmission of
medical data collected from IoT sensors embedded in patients to the Personal Digital
Assistant (PDA) for further processing.
Step 2: Data encryption: The collected medical data is encoded utilising a hybrid encryp-
tion algorithm (AES + Blowfish) to ensure data security during transmission.
Step 3: Secure repository: The encrypted data is saved in the cloud for later retrieval with
appropriate access controls and encryption mechanisms in place.
Step 4: Blockchain transmission: The use of blockchain for transmitting the encrypted data
further raise the security of data transmission and reduces the risk of data breaches.
Step 5: Key generation: The generation of encryption and decryption keys using a hybrid
deep learning model (LSTM and CNN) ensures the uniqueness and robustness of the
keys.
Step 6: Optimal key selection: The selection of the optimal key using the Self-Improved
Lion Optimization Algorithm (SI-LA) ensures the efficiency and effectiveness of the
encryption and decryption action.
Overall, the workflow is designed to achieve the objectives of securing medical data
during transmission and storage, preventing unauthorized access, and maintaining the pri-
vacy and confidentiality of patient information.
13
Multimedia Tools and Applications
3.1 Secure transmission
The primary goal of this workflow is to make sure that medical facts collected from IoT
sensors embedded in patients is transmitted securely to the PDA for additional processing.
3.2 Data encryption
Data encryption encrypts a message so that only the sender and the designed recipient can
understand it. The best way to secure data is through encryption. A hybrid encryption algo-
rithm (AES + Blowfish) is utilised to scramble the collected medical data in order to pro-
tect it during transmission.
Step 1–Data encryption: The collected medical data is encoded by hybrid encryption
algorithm (AES + Blowfish) as follows:
Mathematically:
p be the plaintext data, k1 and k2 be the randomly generated keys for AES and Blowfish
respectively, and c be the ciphertext data.
p is divided into fixed-size blocks: p1, p2... pn.
For each block pi AES encryption is applied with K1 ∶ AES K1(, Pi =)C1.
( )
The CNN([selects the] best ) key K from the sequence based on a fitness function:
K = CNN K1, K2,.... Kn , S .
Step 3–- Optimal key selection: The selection of the optimal key using the Self-
Improved Lion Optimization Algorithm (SI-LA) as follows:
The fitness function for the SI-LA is based on the performance of the encryption/
decryption process using the candidate key. The algorithm starts with an initial popula-
tion of candidate keys, and iteratively improves the population using the SI-LA algo-
rithm. The best key in the final population is selected as the optimal key.
Mathematically:
13
Multimedia Tools and Applications
Let K be the candidate encryption/decryption key, and F(K) be its fitness value. ]
The SI-LA starts with an initial population of candidate keys: P = K1 , K2 , ...., Kn .
[
The fitness function for a candidate key K is based on the performance of the encryp-
tion/decryption process: F(K) = f (Encrypt(P, K), Decrypt(C, K)).
The SI-LA iteratively improves the population by applying selection, crossover, and
mutation operators.
The best key in the final population is selected as the optimal key: K ∗= arg max (F(P)).
3.3 Secure storage
The encrypted fact is accumulated in the cloud for later retrieval with appropriate access
controls and encryption mechanisms in place.
3.4 Blockchain transmission
The use of blockchain for transmitting the encrypted data further amplify the security of
data transmission and reduces the risk of data breaches.
3.5 Key generation
The robustness and uniqueness of the keys are guaranteed by the generation of encryption
and decryption keys using a hybrid deep learning model (LSTM and CNN).
3.5.1 LSTM‑CNN
LSTM It is also known as Long Short-Term Memory that is repeatedly engaged in speech
and natural language processing. The vanishing gradient problem is a drawback of conven-
tional RNNs, which causes the network to struggle to retain knowledge from earlier time
steps as it moves forward in time. In order to solve this problem, LSTM was developed. It
has a more intricate architecture with a number of "gates" that enable the network to selec-
tively remember or forget information. Three gates are found in LSTM cells. The forget
gate decides which information should be removed from the cell, while the input gate con-
trols how much new information is permitted to enter the cell. The amount of information
output from the cell is controlled by the output gate. Backpropagation through time is used
to train the LSTM network, which involves calculating the gradient over all time steps. As a
result, the network can learn long-term dependencies and remember information for longer.
A variety of tasks, including language modelling, speech recognition, machine translation,
and image captioning, have demonstrated the effectiveness of LSTM.
CNN Convolutional neural network (CNN) is intended to learn spatial feature hierarchies
automatically and adaptively from input data. The use of convolutional layers, which ena-
bles the network to quickly process images and other spatial data, is the main innovation of
CNNs. An output of a convolutional layer is determined of feature maps after implement-
ing a set of learnable filters to the input data. The feature maps show the activations of
these filters across the input data. Each filter recognises a specific feature or pattern in the
input data, such as edges or corners.
Architectural diagram of LSTM-CNN
13
Multimedia Tools and Applications
Convolutional layer of CNN Several filters Turn past the convolutional layer for the pro-
vided input data. The output of this layer is then calculated as the sum of a multiplication
of the filters’ individual elements. The weighted summation is positioned as a component
of the following level. The stride, filter size, and zero padding parameters are each used
to specify a convolutional operation. The sliding step is unyielding by stride, which is a
positive integer value. The inclusion of the data at the edge of the input matrix is the main
objective of zero padding. When there is no padding, the convolution output is small than
what is inputted. As a result, a network can only have a certain number of convolutional
layers because doing so reduces the size of the network.
Max pooling layer of CNN The inputs’ dimension is around diminished by the pooling
layer. The widely used pooling technique, max pooling, outputs the highest value (2 ∗ 2)
that can be found inside the pooling filter. Averaging and summation are two additional
pooling techniques. The max pooling, is promising method because it produces consider-
able results by 75% down sampling the input size.
Flatten layer of CNN The resultant 2-D arrays from pooled feature maps are all flattened
toward a single, lengthy continuous linear vector. To classify the image, the flattened
matrix is fed as input to the fully connected layer.
LSTM layer Recurrent neural networks (RNNs) have the capacity to amplify the past data
using a neural network structure resembling a chain. It examines both the existing data mt
and the former results of the secret state hiddent−1 at each time step even though processing
sequential data. Still, as the distance amidst two-time steps widens, standard RNNs lose
their ability to recognize enduring dependencies. In order to solve this issue, LSTM was
first introduced as an effective architecture with outstanding results in statistical machine
translation. Also used the standard formation although the fact that many LSTM variants
have been intended.
The LSTM has form of frequent modules for anytime step as in a standard RNN. At
each time step, the output of the module is restrained by a set of gates in Rdim ens as a
responsibility of the old not visible state hiddent−1 and the input at the present moment step
mt the forget gate forgett the input gate int , and the result gate outputt . Each of these gates
13
Multimedia Tools and Applications
settle how to revise the present-day memory cell as a group pt and the current hidden state
ut . Also used dim ens to indicate the memory size in the LSTM and all vectors in this frame
split the identical size. The LSTM transitional procedures are described in Eqs. (1) - (6).
(1)
( [ ] )
int = 𝜎 Cin . hiddent−1 , mt + Vin
(2)
( [ ] )
forgett = 𝜎 Cforget . hiddent−1 , mt + Vforget
(3)
( [ ] )
st = tanh hidden Cs . hiddent−1 , mt + Vs
(4)
( [ ] )
outputs = 𝜎 Coutput . hiddent−1 , mt + Voutput
(6)
( )
hiddent = outputt ⊙ Pt
𝜎 is the operational sigmoid feature with a productivity in [0, 1] tanh represent the hyper-
bolic tangent function with a turnout in [−1, 1], ⊙ connotes the elementwise multiplication.
To comprehend the architecture’s system, view forgett as the ability to regulate how much
data in an old memory cell is cast-off, int to decide how much new data is stored within
the currently active memory cell, and outputt to modify the output in accordance with the
stored cell pt . Since LSTM is specifically made for learning dependencies that last from
time-series data, it should be used after the convolution layer for what is required in the
progression of higher-level factors.
Fully connected layer of CNN Neurons in the fully connected layer have close interactions
to the neurons in the two adjacent layers; they are not connected to each neuron in those
layers. This is equivalent to how neurons are arranged in conventional ANN methods.
Step 1: Initialize the male Amale, Female Afemale and nomadic lion Anomad.
The beginning of pride is made by provincial lion, lioness, and nomadic lion as Amale ,
Afemale and nomadic lion Anomad correspondingly. The pride generation process examines
the generation of the nomadic lion. The vector element of Anomad, Amale, Afemale is stated
as Anomad , Amale, Ad are considered to be arbitrary integers with the highest and lowest
female
d d
bounds, as specified in Eq. (8). When n > 1, where d = 1, 2, ....len the Lion’s length len is
formulated as per Eq. (7)
{
n; n > 1
len =
0; otherwise (7)
13
Multimedia Tools and Applications
Here, n and o are integers to determine the measure of the lion. When n = 1, the evolu-
tion of search using binary lion in the method, so the creation of vector elements can be
moreover 0 or 1.
f bd ∈ bmin (8)
max
( ) ( )
i , bi
o%2 = 0 (9)
In which,
len
len
( ) ∑ ( )
f bd = dd 2 −d (10)
d=1
2
Equations (8) and (10) guarantee that the originated lion is in format in binary and falls
in the boundaries. Equation (9) ensures that an even number will be produced by generat-
ing a solution has the same number of real and fractions with decimal values. Anomad it is
believed that two nomadic lions are attempting to seize the area. only when engaged in the
territorial defence method, the extra nomadic lion can be begun. Position remains vacant
until then and Anomad can be denoted as Anomad
1
.
Step 2: Evaluate the fitness of the male, female and nomad lions. The fitness function of
this research
( work is:)
Fit = min Kg length
Step 3: Set the reference fitness Crefer as the fitness of the Amale and initialize the genera-
tion count Countf = 0.
Step 4: Store the Amale and its fitness C Amale .
( )
The male lions are drawn to the female’s spot using the next pheromone that the femi-
nine release.
Amount of pheromone released by a female has a direct correlation with her sex appeal.
The amount of pheromone that the female lion releases diffuse downwind and achieve each
male firefly varies depending on two things: (i) range (ii) strength and guidance of the
wind. The concentration of each female’s pheromone that reaches the male lion is therefore
determined in this subsection. If a high-speed wind carries the highly concentrated phero-
mone of a fit female farther away in his direction, the male may choose her. The intensity
of focus of female Afemale pheromone achieves the male Amale, H , is calculated by using
(11).
( )
�����⃗.wind
H = fit ∗ diff �������⃗ (11)
13
Multimedia Tools and Applications
(12)
2
App = fite−𝛾Eu
where App is the appeal of Amale seen by Afemale, 𝛾 is a constant in the range, Eu is the
Euclidean distance between a man and a woman, and fit is the fitness value of the Amale.
(iii) Calculation of the mutual attraction
A number of males and females are matched together as prospective parents based on
the strength of their attraction to one another. The first mating pair is chosen based on
which pair has the highest mutual attraction value. The collaboration interest in each other
female lion Afemale and the male lion Amale, MutAtt is defined as Eq. (13)
MutAtt = App + H (13)
The quantity of sperms in the male’s sperm reservoir and the female’s spermatheca are
updated following each mating. The following subsection provides details on the update
process. If the male member of the pair still has some sperm in the sperm reservoir and the
female’s sperm bucket continued failure, the pair with the next highest value is chosen.
(iv) Perform crossover & mating to generate new cubs
Case 1 The 2-point crossover operator is used to produce the offspring when the parents
possess not been together before. The 2-point (Fig. 5) crossover operator selects a start
position and an end position at random on the parent chromosomes. The genes between
these two positions are then crossed over and placed in the identical spot on the chromo-
somes of the two offspring, each of whom still has the original genes from each parent
earlier the crossover.
Case 2 The n-point crossover operator is applied to produce the offspring if either parent
has previously been mated. Starting with n∕2 pairs of back-to-back start and last point cho-
sen at random, the n-point (Fig. 6) crossover operator crosses the genes from the parents
across each set of the starting and ending roles. The remaining genes are kept.
13
Multimedia Tools and Applications
Step 7: Cluster the cubs based on gender to obtain male Amale & female Afemale cub pools.
Step 8: Set the cub accumulation factor to 0.
Step 9: Implement the cub growth function to determine which cubs are qualified to join
the pride.
Step 10: Execute the territorial defence to protect the pride from outside threats.
Territorial defence offers thorough solution space looking, instructs to stay away from the
local optimal point also pinpoint various remedies with the equal aptness. The formation of a
nomad coalition, a battle for survival, then updates to the nomad coalition and pride are listed
as the order of territorial defence. Using the winner-take-all strategy, the nomad coalition is
simplified for identifying Ag−nomad . Moreover, Ag−nomad is selected, only if it meets Eqs. (14)
(15).
( ) ( )
c(Ag−nomad ) < c(Ao_cubs )
c Ag−nomad < c Ac_cubs (15)
13
Multimedia Tools and Applications
When Ao_cubs as well as Ao_cubs matures, geographical takeover occurs and evolves Amale
and Afemale. The maturing is specified as the age of cub that goes outside the utmost permis-
sible for cub maturity Bmax.
Step 11: If the territorial defence is successful, go back to step 5; otherwise proceed step
12.
Step 12: execute a takeover of the territory to gain updated male & female lions.
Step 13: Increment the generation counter by one.
Step 14: If the stopping criterion is not met, go back to step 4; otherwise proceed to step
15.
Step 15: Terminate and return the male lion as the optimal solution.
3.7 Theoretical analysis
It is clear that both symmetric and asymmetric encryption techniques are being used when
a hybrid encryption algorithm is used.
Asymmetric encryption is used to safely exchange the symmetric encryption keys while
symmetric encryption is effective for encrypting large amounts of data.
Data confidentiality during transmission is ensured by this method.
3.7.2 Blockchain technology
Blockchain offers a distributed and unchangeable ledger for securely storing transactions
and other data.
By assuring that data added to the blockchain cannot be changed or removed without
network consensus, it improves data security.
Additionally, blockchain offers auditability and transparency, which are essential in the
healthcare industry for monitoring data access and alteration.
The system creates encryption and decryption keys based on machine learning, as sug-
gested by the usage of a hybrid deep learning model that combines LSTM and CNN.
Deep learning models may be able to provide robust and distinctive keys, improving the
encryption process’ security.
A thorough approach to key generation is evident from the fact that CNN is skilled at
image processing and LSTM is well known for handling sequences.
The selection of the best keys using SI-LA suggests that an optimization method is used by
the system to select the best keys from the pool of created keys.
By choosing keys that maximize specific parameters, such as randomness and unpre-
dictability, optimization algorithms like SI-LA can increase the effectiveness and efficiency
of cryptographic operations.
13
Multimedia Tools and Applications
4.1 Dataset description
4.2 Performance metrics
13
Multimedia Tools and Applications
Response time is the amount of time taken when a job first receives the CPU after enter-
ing the ready state.
vi) Record time
Record time may refer to the fastest processing speed achieved by a computer or the
shortest time taken to perform a particular task.
The Table 2 presents the results of a performance evaluation of four different encryption
algorithms: LO, BSA, HBA, and Proposed for the 1st data metrics. The proposed algo-
rithm has the lowest encryption time of 0.117233 s, indicating that it is the fastest algo-
rithm in terms of encrypting data. The proposed algorithm also has the lowest decryption
time of 0.109022 s, indicating that it is the fastest algorithm in terms of decrypting data.
The proposed algorithm again has the lowest key generation time of 0.226255 s, indicating
that it can generate keys faster than the other algorithms. The proposed algorithm has the
highest restoration efficiency of 0.814648, indicating that it can recover the system bet-
ter than the other algorithms in case of damage or attack. The proposed algorithm has the
lowest response time of 202.906 s, indicating that it is the fastest in responding to user
requests. The proposed algorithm also has the lowest record time of 12.6817 s, indicating
that it can perform the task faster than the other algorithms. Overall, the proposed algo-
rithm outperforms the other algorithms in terms of encryption time, decryption time, key
generation time, restoration efficiency, response time, and record time. These results sug-
gest that the proposed algorithm can provide fast and efficient encryption and decryption
operations, generate keys faster, recover the system better, respond to user requests faster,
and perform the task faster.
The Table 3 presents the results of a performance evaluation of four different encryp-
tion algorithms: LO, BSA, HBA, and Proposed for data metrics 2nd. The proposed
algorithm has the lowest encryption time of 0.112043 s, indicating that it is the fastest
algorithm in terms of encrypting data. The proposed algorithm has the second-lowest
decryption time of 0.104196 s, just behind the HBA algorithm, indicating that it is one
of the fastest algorithms in terms of decrypting data. Proposed algorithm has the sec-
ond-lowest key generation time of 0.216239 s, just behind the LO algorithm, indicating
that it can generate keys faster than most of the other algorithms. The proposed algo-
rithm has the highest restoration efficiency of 0.888446, indicating that it can recover
the system better than the other algorithms in case of damage or attack. The proposed
algorithm has the lowest response time of 216.188 s, indicating that it is the fastest
in responding to user requests. The proposed algorithm has the lowest record time
of 13.5117 s, indicating that it can perform the task faster than the other algorithms.
Overall, the proposed algorithm performs well in terms of encryption time, decryption
time, key generation time, restoration efficiency, response time, and record time. These
13
Multimedia Tools and Applications
results suggest that the proposed algorithm can provide fast and efficient encryption and
decryption operations, generate keys faster, recover the system better, respond to user
requests faster, and perform the task faster.
The Table 4 presents the statistical measures of four different encryption algorithms:
LO, BSA, HBA, and Proposed. Standard Deviation measures the amount of variation or
dispersion in the data. The proposed algorithm has standard deviation of 0.00259501, indi-
cating that its encryption time results are relatively consistent or close to each other. Mean
measures the average of the encryption time results. The proposed algorithm has mean of
0.114638 s, indicating that it has the fastest encryption time on average among the four
algorithms. Median measures the middle value of the encryption time results. The median
of each algorithm is the same as its mean, indicating that the data is symmetrically distrib-
uted. Min measures the minimum value of the encryption time results. The proposed algo-
rithm has the lowest minimum value of 0.112043 s, indicating that it has the fastest encryp-
tion time among the four algorithms at its best performance. Max measures the maximum
value of the encryption time results. The BSA algorithm has the highest maximum value of
0.132604 s, indicating that it has the slowest encryption time among the four algorithms at
its worst performance. Overall, the statistical measures suggest that the proposed algorithm
has consistent and fast encryption time results, with the lowest mean and minimum value
among the four algorithms. The HBA algorithm has the most consistent results with the
lowest standard deviation, while the BSA algorithm has the slowest encryption time with
the highest maximum value. However, it is important to note that these results are based
on a specific set of data and may vary depending on the size and complexity of the data, as
well as the hardware and software used for the encryption process.
Figure 8 shows the Restoration Efficiency of LO, BSA, HBA and Proposed Technique.
The restoration efficiency is a metric that measures the percentage of original data that can
be restored from the encoded data after experiencing various types of errors or damages. In
the context of encryption algorithms, restoration efficiency is a crucial metric that indicates
how reliable and secure an algorithm is in preserving the integrity of the encrypted data.
13
Multimedia Tools and Applications
Figure 9 shows the Response Time of LO, BSA, HBA and Proposed Technique. The
response time is a crucial metric that measures the time taken by an algorithm to pro-
cess and encrypt/decrypt data. A low response time indicates that the algorithm is faster
and more efficient in processing data, while a high response time indicates that the algo-
rithm is slower and less efficient.
Figure 10 shows the Record Time of LO, BSA, HBA and Proposed Technique. The
record time is a metric that measures the time taken to read and write data from/to a
storage device. It is an important metric for encryption algorithms that require frequent
read and write operations, such as in database management systems.
Figure 11 demonstrates the Key Generation Time of LO, BSA, HBA and Proposed
Technique. Key generation time is an important metric for encryption algorithms as it
measures the time taken to generate keys that are used to encrypt and decrypt data. A
faster key generation time can lead to improved efficiency and faster data processing
times.
Figure 12 shows the Encryption Time of LO, BSA, HBA and Proposed Technique. The
length of time it takes to secure data makes encryption time a crucial parameter for encryption
13
Multimedia Tools and Applications
algorithms. Increasing efficiency and hastening the processing of data are two benefits of
faster encryption times.
Figure 13 shows the Decryption Time of LO, BSA, HBA and Proposed Technique.
Decryption time, which gauges how long it takes to decrypt encrypted data, is a crucial meas-
urement for encryption algorithms.
Figure 14 shows the Turn Around Time of LO, BSA, HBA and Proposed Technique. The
term "turnaround time" is occasionally used to refer to the "response time" or "total process-
ing time" of an algorithm, which is the length of time needed overall to complete a task from
beginning to end, taking into account all processing, communication, and waiting times.
5 Conclusion
E-health has become a significant area of research. Because patient data is so valua-
ble, maintaining patient privacy may be challenging. Healthcare applications frequently
store patient data in the cloud, which restricts the users’ ability to fully control their
13
Multimedia Tools and Applications
13
Multimedia Tools and Applications
data. IoT sensors installed in patients was used to collect medical data, which was then
processed by the PDA. The collected medical data are transmitted securely by a hybrid
encryption algorithm. The cloud was where the encrypted data which was stored for
later retrieval, with the proper encryption and access controls in place. The use of block-
chain to transmit encrypted data further improves data security and lowers the possibil-
ity of data breaches. The robustness and uniqueness of the encryption and decryption
keys was guaranteed by the use of a hybrid deep learning model (LSTM and CNN). The
Self-Improved Lion Optimization Algorithm (SI-LA) was used to choose the best key,
guaranteeing the speed and effectiveness of the encryption and decryption procedures.
The proposed model could be guaranteed to be a more productive technique than the
existing technique in terms of performance metrics because the model’s performance
was compared with that of the available technology.
Data Availability The UCI Heart Disease Data utilized in this research is publicly available and can be
accessed through the UCI Machine Learning Repository (https://archive.ics.uci.edu/ml/datasets/Heart+
Disease). The dataset provides valuable insights into various cardiovascular parameters and has been instru-
mental in our study on ensuring the privacy and security of IoT-medical data.
Declarations
Competing Interests There isn’t any competing interests associated with the research presented in this article,
“Ensuring the Privacy and Security of IoT-Medical Data: A Hybrid Deep Learning-Based Encryption and
Blockchain-Enabled Transmission”. No financial or non-financial conflicts of interest exist that could influ-
ence the research, analysis, or interpretation of the findings. The focus of this work is solely on advancing
methodologies to enhance the privacy and security of medical data in the context of the Internet of Things.
References
1. Sleeman KE, De Brito M, Etkind S, Nkhoma K, Guo P, Higginson IJ, Gomes B, Harding R (2019)
The escalating global burden of serious health-related suffering: projections to 2060 by world
regions, age groups, and health conditions. Lancet Glob Health 7(7):e883–e892
2. Chen Y, Ding S, Xu Z, Zheng H, Yang S (2019) Blockchain-based medical records secure storage
and medical service framework. J Med Syst 43:1–9
3. Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in
IoT. IEEE Trans Industr Inf 14(4):1656–1665
4. Onesimu JA, Karthikeyan J, Sei Y (2021) An efficient clustering-based anonymization scheme
for privacy-preserving data collection in IoT based healthcare services. Peer Peer Netw Appl
14:1629–1649
5. Saha R, Kumar G, Rai MK, Thomas R, Lim SJ (2019) Privacy ensured ${e} $-healthcare for fog-
enhanced IoT based applications. IEEE Access 7:44536–44543
6. Luo E, Bhuiyan MZA, Wang G, Rahman MA, Wu J, Atiquzzaman M (2018) Privacyprotector: privacy-
protected patient data collection in IoT-based healthcare systems. IEEE Commun Mag 56(2):163–168
7. Renuka K, Kumari S, Li X (2019) Design of a secure three-factor authentication scheme for smart
healthcare. J Med Syst 43:1–12
8. Prince PB, Lovesum SJ (2020) Privacy enforced access control model for secured data handling in
cloud-based pervasive health care system. SN Comput Sci 1(5):239
9. Chenthara S, Ahmed K, Wang H, Whittaker F (2019) Security and privacy-preserving challenges of
e-health solutions in cloud computing. IEEE Access 7:74361–74382
10. Vijayalakshmi AV, Arockiam L (2018) ARO_EDGE: a technique to ensure data security in Internet of
Things (IoT). Asian J Comput Sci Technol 7(2):52–56
11. Akkaoui R, Hei X, Cheng W (2020) EdgeMediChain: a hybrid edge blockchain-based framework for
health data exchange. IEEE Access 8:113467–113486
13
Multimedia Tools and Applications
12. Yaacoub JPA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R, Chehab A (2020) Securing
internet of medical things systems: limitations, issues and recommendations. Futur Gener Comput Syst
105:581–606
13. Sengan S, Khalaf OI, Sharma DK, Hamad AA (2022) Secured and privacy-based IDS for healthcare
systems on E-medical data using machine learning approach. Int J Reliab Qual E-Healthc (IJRQEH)
11(3):1–11
14. Baban AB, Hameed SA (2023) Securing a web-based hospital management system using a combina-
tion of AES and HMAC 93–99
15. Wahab F, Zhao Y, Javeed D, Al-Adhaileh MH, Almaaytah SA, Khan W, Saeed MS, Kumar Shah R
(2022) An AI-driven hybrid framework for intrusion detection in IoT-enabled E-health. Comput Intell
Neurosci 2022:1–11
16. El Zouka HA, Hosni MM (2021) Secure IoT communications for smart healthcare monitoring system.
Internet Things 13:100036
17. Mohiyuddin A, Javed AR, Chakraborty C, Rizwan M, Shabbir M, Nebhen J (2022) Secure
cloud storage for medical IoT data using adaptive neuro-fuzzy inference system. Int J Fuzzy Syst
24(2):1203–1215
18. Dwivedi AD, Srivastava G, Dhar S, Singh R (2019) A decentralized privacy-preserving healthcare
blockchain for IoT. Sensors 19(2):326
19. Stamatellis C, Papadopoulos P, Pitropakis N, Katsikas S, Buchanan WJ (2020) A privacy-preserving
healthcare framework using hyperledger fabric. Sensors 20(22):6587
20. Almaiah MA, Hajjej F, Ali A, Pasha MF, Almomani O (2022) A novel hybrid trustworthy decen-
tralized authentication and data preservation model for digital healthcare IoT based CPS. Sensors
22(4):1448
21. Ali A, Rahim HA, Pasha MF, Dowsley R, Masud M, Ali J, Baz M (2021) Security, privacy, and reli-
ability in digital healthcare systems using blockchain. Electronics 10(16):2034
22. Ngabo D, Wang D, Iwendi C, Anajemba JH, Ajao LA, Biamba C (2021) Blockchain-based secu-
rity mechanism for the medical data at fog computing architecture of internet of things. Electronics
10(17):2110
23. Jyotheeswari P, Jeyanthi N (2020) Hybrid encryption model for managing the data security in medical
internet of things. Int J Internet Protoc Technol 13(1):25–31
24. Bi H, Liu J, Kato N (2021) Deep learning-based privacy preservation and data analytics for IoT ena-
bled healthcare. IEEE Trans Industr Inf 18(7):4798–4807
25. Din IU, Almogren A, Guizani M, Zuair M (2019) A decade of internet of things: analysis in the light
of healthcare applications. IEEE Access 7:89967–89979
26. Hssayni EH, Joudar NE, Ettaouil M (2022) A deep learning framework for time series classification
using normal cloud representation and convolutional neural network optimization. Comput Intell
38(6):2056–2074
27. Joudar NE, Ettaouil M (2022) An adaptive drop method for deep neural networks regularization: esti-
mation of DropConnect hyperparameter using generalization gap. Knowl-Based Syst 253:109567
28. Hssayni EH, Joudar NE, Ettaouil M (2022) Localization and reduction of redundancy in CNN using L
1-sparsity induction. J Ambient Intell Humaniz Comput:14(10):13715–13727
Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under
a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted
manuscript version of this article is solely governed by the terms of such publishing agreement and applicable
law.
13