Page 158 - {PDF Title}
P. 158

Mhaske and Kumar

                to as “BDSDT.” In particular, by utilizing  the  Zero   vulnerable,  where hackers and other unapproved
                Knowledge Proof technique, a unique adaptable BT was   parties can readily access the data. This vulnerability
                suggested to guarantee confidentiality as well as safe   not only compromises patient data but restricts access
                data transfer. To identify intrusions in the HS network, a   for patients and health-care professionals. The existing
                DL method was designed using the verified data. Then,   approaches are unable to strike a compromise between
                an efficient intrusion detection system was created by   data  accessibility  and  security.  However,  BT  offers
                combining bidirectional long short-term memory with   a promising solution  to these problems. Blockchain
                deep sparse autoencoder.                            establishes  an immutable ledger  system that  enables
                  The rapid adoption of ubiquitous computing  and   decentralized  transaction  processing.  A novel  PP
                mobile  communication  has led  to the  emergence   technique  is proposed for securing EHR, with stages
                of mobile health, while urbanization  has driven the   shown in Figure 1.
                development  of smart  cities.  The  concept  of smart   Initially, the improved  ARM approach is used to
                health integrates these two trends, creating a context-  analyze  medical  data  and  find  the ASRs  between  the
                aware  health-care  system  within  smart  cities  to   data  characteristics.  These rules are important  since
                enhance service efficiency and human-centered care.    they aid in identifying  sensitive items in the dataset.
                                                               40
                Context-aware health-care systems that utilize context   Improvement in ARM approaches improves the process
                awareness in smart health-care applications emphasize   and guarantees a more precise identification of patterns
                the  importance  of user demographics,  location,  and   in sensitive data. After identifying the ASRs, the SBI-
                medical history, which aligns with the concept of smart   TSA method is developed to identify the optimal keys,
                health within smart cities.  With the rapid development   which are employed to encrypt and decode sensitive
                                      41
                of machine learning for the detection of diseases using   data.  These  optimal  keys are  derived  by considering
                imaging  scans, 42,43   patient  records  have  become  an   IPR, HFR, and MD.
                invaluable resource. It facilitates diagnostics, leading to   The sensitive data are subjected to an exclusive OR
                the development of artificial intelligence-based medical   (XOR) operation for sanitization using the optimal keys.
                techniques. EHRs are simpler to access and manage   This sanitized data is then stored on a blockchain. This
                than paper records, but more caution is needed to ensure   phase ensures that the stored data cannot be decrypted
                that the privacy of the data is maintained. Because of   without the matching key, even in the event of illegal
                their centralized architecture, traditional and modern   access. When retrieval is necessary, the sanitized data
                EHR systems, which are utilized for exchanging data   undergoes a reverse XOR process with the optimal
                between medical participants (patients, doctors, insurers,   key, restoring it to its original format. This decryption
                pharmaceuticals, doctors, and researchers), have security   process allows authorized individuals to safely access
                and privacy flaws. To prevent breaches of information   and use the information.
                privacy, several clinics and institutions have prohibited
                medical data transfer and exchange. Data barriers have   4. Data sanitization using improved ARM
                arisen as a consequence of health data being dispersed
                among several health-care providers, exacerbated by   Assume the  medical  dataset as  d  and  D  as the  data
                                                                                                   s
                                                                                                          t
                concerns over health-care data security and privacy. As   within the dataset.  This medical data  D  (D  = {D ,
                                                                                                                    1
                                                                                                          t
                                                                                                             i
                a result, BT is proposed as a solution, using encryption   D , … D }) is initially processed using the improved
                                                                            n
                                                                      2
                to guarantee the security and privacy of EHR systems.   ARM. Data sanitization is vital for conserving privacy
                BT overcomes the limitations of traditional centralized   by sanitizing  data D . Sanitization  includes  precisely
                                                                                       t
                systems, which are often inaccessible.  The existing   identifying the sensitive information within the data to
                health-care system is perceived as complicated and   protect data privacy while preserving the data validity.
                expensive, but BT can mitigate these issues by enhancing
                insurance management and data handling. Furthermore,   4.1. Conventional ARM
                the decentralized nature of this system eliminates central   ARM analyzes input medical data D  to find significant
                                                                                                    t
                attack points and reduces the risk of system failures.  correlations  or  links  between  different  elements,
                                                                    including  diseases, therapies, indications,  and other
                3. PP of EHRs using BT                              factors. By finding important patterns in huge datasets,
                                                                    this approach seeks to provide insights that might
                EHRs are digital  patient  records stored on networks.   improve  patient care  and decision-making.  These
                Still, current storage methods have proven to be quite   methods selectively hide some ASRs that may otherwise



                Volume 22 Issue 1 (2025)                       152                           doi: 10.36922/AJWEP025040017
   153   154   155   156   157   158   159   160   161   162   163