3.8 Proceedings Paper

A Cyber Resilience Framework for NG-IoT Healthcare Using Machine Learning and Blockchain

Publisher

IEEE
DOI: 10.1109/ICC42927.2021.9500496

Keywords

eHealth; IoT; Security; Blockchain; Machine Learning; Access Control

Funding

  1. European Union [957406]

Ask authors/readers for more resources

IoT technology has been integrated into the healthcare industry, contributing to the development of smart hospitals and remote assistance environments. Ensuring the security of patient data against malicious attempts is a major challenge, requiring monitoring of the intelligent healthcare environment and limiting access. Additionally, implementing appropriate control measures for digital health records is crucial.
Internet of Things (IoT) technology such as intelligent devices, sensors, actuators and wearables have been integrated in the healthcare industry, thus contributing in the creation of smart hospitals and remote assistance environments. Ensuring the eHealth network adopts the appropriate security measures in order to effectively protect sensitive patient data against malicious attempts is a tough challenge. Devices composing eHealth infrastructure are considered to be easily exploitable. To that end, a solution monitoring the intelligent healthcare environment is of essence. In addition, by digitalising all health records, appropriate measures need to be implemented in order for patient records to be accessible by authorized personnel only. Furthermore, creating interoperable systems, capable of being integrated by multiple organizations such as hospitals and insurance companies, while maintaining a General Data Protection Regulation-friendly posture, providing access to health data is a great importance for optimal patient assistance. To address both concerns, we present a framework featuring a multi-layer tool for providing a highly effective security solution specifically designed to address the eHealth requirements, and a blockchain access control component, based on smart contracts to provide access control for authorized users to patient records and health data in a distributed way.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available