Mohd Anjum, Naoufel Kraiem, Hong Min, Ashit Kumar Dutta, Yousef Ibrahim Daradkeh, Sana Shahab
{"title":"Opportunistic access control scheme for enhancing IoT-enabled healthcare security using blockchain and machine learning.","authors":"Mohd Anjum, Naoufel Kraiem, Hong Min, Ashit Kumar Dutta, Yousef Ibrahim Daradkeh, Sana Shahab","doi":"10.1038/s41598-025-90908-1","DOIUrl":null,"url":null,"abstract":"<p><p>The healthcare industry, aided by technology, leverages the Internet of Things (IoT) paradigm to offer patient/user-related services that are ubiquitous and personalized. The authorized repository stores ubiquitous data for which access-level securities are granted. These security measures ensure that only authorized entities can access patient/user health information, preventing unauthorized entries and data downloads. However, recent sophisticated security and privacy attacks such as data breaches, data integrity issues, and data collusion have raised concerns in the healthcare industry. As healthcare data grows, conventional solutions often fail due to scalability concerns, causing inefficiencies and delays. This is especially true for multi-key authentication. Dependence on conventional access control systems leads to security flaws and authorization errors caused by static user behaviour models. This article introduces an Opportunistic Access Control Scheme (OACS) for leveraging access-level security. This approach is a defendable access control scheme in which the user permissions are based on their requirement and data. After accessing the healthcare record, a centralized IoT security augmentation and assessment is provided. The blockchain records determine and revoke the access grant based on previous access and delegation sequences. This scheme analyses the possible delegation methods for providing precise users with interrupt-free healthcare record access. The blockchain recommendations are analyzed using a trained learning paradigm to provide further access and denials. The proposed method reduces false rates by 11.74%, increases access rates by 13.1%, speeds up access and processing by 12.36% and 13.23%, respectively, and reduces failure rates by 9.94%. The OACS decreases false rates by 10.64%, processing time by 15.62%, and failure rates by 10.95%.</p>","PeriodicalId":21811,"journal":{"name":"Scientific Reports","volume":"15 1","pages":"7589"},"PeriodicalIF":3.9000,"publicationDate":"2025-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11880524/pdf/","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific Reports","FirstCategoryId":"103","ListUrlMain":"https://doi.org/10.1038/s41598-025-90908-1","RegionNum":2,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"MULTIDISCIPLINARY SCIENCES","Score":null,"Total":0}
引用次数: 0
Abstract
The healthcare industry, aided by technology, leverages the Internet of Things (IoT) paradigm to offer patient/user-related services that are ubiquitous and personalized. The authorized repository stores ubiquitous data for which access-level securities are granted. These security measures ensure that only authorized entities can access patient/user health information, preventing unauthorized entries and data downloads. However, recent sophisticated security and privacy attacks such as data breaches, data integrity issues, and data collusion have raised concerns in the healthcare industry. As healthcare data grows, conventional solutions often fail due to scalability concerns, causing inefficiencies and delays. This is especially true for multi-key authentication. Dependence on conventional access control systems leads to security flaws and authorization errors caused by static user behaviour models. This article introduces an Opportunistic Access Control Scheme (OACS) for leveraging access-level security. This approach is a defendable access control scheme in which the user permissions are based on their requirement and data. After accessing the healthcare record, a centralized IoT security augmentation and assessment is provided. The blockchain records determine and revoke the access grant based on previous access and delegation sequences. This scheme analyses the possible delegation methods for providing precise users with interrupt-free healthcare record access. The blockchain recommendations are analyzed using a trained learning paradigm to provide further access and denials. The proposed method reduces false rates by 11.74%, increases access rates by 13.1%, speeds up access and processing by 12.36% and 13.23%, respectively, and reduces failure rates by 9.94%. The OACS decreases false rates by 10.64%, processing time by 15.62%, and failure rates by 10.95%.
期刊介绍:
We publish original research from all areas of the natural sciences, psychology, medicine and engineering. You can learn more about what we publish by browsing our specific scientific subject areas below or explore Scientific Reports by browsing all articles and collections.
Scientific Reports has a 2-year impact factor: 4.380 (2021), and is the 6th most-cited journal in the world, with more than 540,000 citations in 2020 (Clarivate Analytics, 2021).
•Engineering
Engineering covers all aspects of engineering, technology, and applied science. It plays a crucial role in the development of technologies to address some of the world''s biggest challenges, helping to save lives and improve the way we live.
•Physical sciences
Physical sciences are those academic disciplines that aim to uncover the underlying laws of nature — often written in the language of mathematics. It is a collective term for areas of study including astronomy, chemistry, materials science and physics.
•Earth and environmental sciences
Earth and environmental sciences cover all aspects of Earth and planetary science and broadly encompass solid Earth processes, surface and atmospheric dynamics, Earth system history, climate and climate change, marine and freshwater systems, and ecology. It also considers the interactions between humans and these systems.
•Biological sciences
Biological sciences encompass all the divisions of natural sciences examining various aspects of vital processes. The concept includes anatomy, physiology, cell biology, biochemistry and biophysics, and covers all organisms from microorganisms, animals to plants.
•Health sciences
The health sciences study health, disease and healthcare. This field of study aims to develop knowledge, interventions and technology for use in healthcare to improve the treatment of patients.