Digital Health Transformation with Blockchain and Artificial Intelligence
eBook - ePub

Digital Health Transformation with Blockchain and Artificial Intelligence

  1. 368 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Digital Health Transformation with Blockchain and Artificial Intelligence

About this book

The book Digital Health Transformation with Blockchain and Artificial Intelligence covers the global digital revolution in the field of healthcare sector. The population has been overcoming the COVID-19 period; therefore, we need to establish intelligent digital healthcare systems using various emerging technologies like Blockchain and Artificial Intelligence. Internet of Medical Things is the technological revolution that has included the element of "smartness" in the healthcare industry and also identifying, monitoring, and informing service providers about the patient's clinical information with faster delivery of care services. This book highlights the important issues i.e. (a) How Internet of things can be integrated with the healthcare ecosystem for better diagnostics, monitoring, and treatment of the patients, (b) Artificial Intelligence for predictive and preventive healthcare systems, (c) Blockchain for managing healthcare data to provide transparency, security, and distributed storage, and (d) Effective remote diagnostics and telemedicine approach for developing smart care. The book encompasses chapters belong to the blockchain, Artificial Intelligence, and Big health data technologies.

Features:

  • Blockchain and internet of things in healthcare systems
  • Secure Digital Health Data Management in Internet of Things
  • Public Perception towards AI-Driven Healthcare
  • Security, privacy issues and challenges in adoption of smart digital healthcare
  • Big data analytics and Internet of things in the pandemic era
  • Clinical challenges for digital health revolution
  • Artificial intelligence for advanced healthcare
  • Future Trajectory of Healthcare with Artificial Intelligence 9
  • Parkinson disease pre-diagnosis using smart technologies
  • Emerging technologies to combat the COVID-19
  • Machine Learning and Internet of Things in Digital Health Transformation
  • Effective Remote Healthcare and Telemedicine Approaches
  • Legal implication of blockchain technology in public health

This Book on "Digital Health Transformation with Blockchain and Artificial Intelligence" aims at promoting and facilitating exchanges of research knowledge and findings across different disciplines on the design and investigation of secured healthcare data analytics. It can also be used as a textbook for a Masters course in security and biomedical engineering. This book will also present new methods for the medical data analytics, blockchain technology, and diagnosis of different diseases to improve the quality of life in general, and better integration into digital healthcare.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Digital Health Transformation with Blockchain and Artificial Intelligence by Chinmay Chakraborty in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Information

1 Blockchain and Internet of Things in Healthcare Systems Prospects, Issues, and Challenges

Kazeem Moses Abiodun and Emmanuel Abidemi Adeniyi
Landmark University, Omu Aran, Nigeria
Joseph Bamidele Awotunde
University of Ilorin, Ilorin, Nigeria
Chinmay Chakraborty
Birla Institute of Technology, Mesra, Ranchi, Jharkhand, India
Dayo Reuben Aremu
University of Ilorin, Ilorin, Nigeria
Ayodele Ariyo Adebiyi and Marion Olubunmi Adebiyi
Landmark University, Omu Aran, Nigeria
DOI: 10.1201/9781003247128-1
Contents
  1. 1.1 Introduction
  2. 1.2 Literature Review
  3. 1.3 Blockchain Technology and IoT
    • 1.3.1 Features of Blockchain
    • 1.3.2 The Internet of Things
    • 1.3.3 Blockchain and IoT Technologies Integration in Healthcare
    • 1.3.4 Digital Health Transformation Using AI
  4. 1.4 Challenges and Prospects of Using Blockchain and IoT in Healthcare
  5. 1.5 Proposed Framework
  6. 1.6 Conclusion
  7. Conflict of Interest
  8. Funding
  9. Data Availability
  10. References

1.1 Introduction

The healthcare industry is directly connected with people’s social welfare and lives, so it is a critical concern for both developing and developed countries. In the healthcare sector, research and development should be a continuous process of making life easier by fighting the many health and illness problems. The innovation and latest breakthroughs in machinery have made it easy to witness the improvement in the healthcare sector. The healthcare and medical sectors’ current capabilities can be enhanced by using cutting-edge and innovative computer technologies. These technologies can aid doctors and medical professionals in the initial detection of a variety of ailments. These powerful computer technologies can also greatly increase the precision of identifying diseases in their initial periods. The various technologies used will allow the IoT devices to exchange information about patient health progress and how they are responding to treatment to their physicians for proper monitoring. IoT makes the connection of humans to humans possible, human to things, and things to other things [1]. Blockchain technology’s uniqueness is its ability to store data immutably without relying on a central authority.
Various developing and innovative computer technologies are already being applied with spectacular outcomes in other industries. IoT, blockchain, machine learning, data mining, NLP, computer vision, the clouds, and many other technologies are among them. The Internet of Things (IoT) refers to the notion that everything is linked to the Web. Vehicles, household equipment, people and other digital objects as well as applications, sensors, drive systems, and connectors that enable data to be connected and collected, and distributed, are all included in this category. Kevin Ashton is known as the ā€œFather of the Internet of Thingsā€, which refers to Internet connectivity that extends from devices like PCs, computers, mobile phones, and there are several physical technologies and daily things not available on the Internet. Wireless connectivity, clouds, sensors and security are the most common technologies employed in the IoT. The four parts of the IoT lifecycle are as follows:
  1. Data is collected using sensors on devices;
  2. The collected data is saved in the cloud for analysis;
  3. The gadget then receives the examined data; and
  4. The equipment responds appropriately.
IoT is useful in a variety of fields, making our lives easier. Agribusiness, smart retailers, autonomous driving and healthcare, smart buildings, smart cities are the most common IoT applications. Security is an important part of any technology, and it is fundamental to the successful operation of IoT networks. Secrecy and authenticity of data, IT communication protocols, user confidence and reliance and the implementation of confidentiality principles techniques are some of the active projects for improving IoT security. The IoT security issue develops as a result of poor program design, which leads to vulnerabilities, which is a major cause of network security difficulties. Proper IoT initialization is achieved in IoT architecture physically to prevent an illegitimate recipient from accessing the system. The five levels of IoT architecture are perceptual layer, logical layer, Internet layer, middleware layer, application layer and business layer. Each level has its own set of aims and challenges. Integrity and Reliability are the three cornerstones of a secure network in IoT. (CIA).
Vulnerabilities in IoT can be classified into four categories, according to multiple research papers: physical assault, intrusion software, networking strike and attack cryptography. The physical attack could take several forms, including (a) node tempering, in which the attacker modifies the compromised node to obtain the encryption key; (b) attack of the IoT system, in which the attacker physically damages the IoT system thereby causing a Denial of Service (DOS) attack; (c) injection of malicious code, which allows the attacker to take complete IoT system management; (d) RF Disturbance to radiofrequency signals is used for RFID communications in which the intruder provides random noise over radio frequency signals; (e) the hacker employs psychological manipulation to acquire the client of an IoT system with sensitive data for his purposes; (f) attack to sleep impoverishment, in which nodes are shut down.; and (g) jamming of nodes in WSNs, the attacker can distract wireless communication by using a jammer. Among the software attacks are (a) phishing attacks, where the attacker creates a false website to gain the user’s personal information; (b) virus attacks, which can harm the system by propagating harmful code via The Internet and email files, and without the assistance of individuals, the virus may reproduce itself; (c) malicious files used to access the system; and (d) the denial of service (DOS) assault which prevents users to access the system.
Another concern is network assaults, which comprise but are not restricted to (a) traffic investigation attacks, in which the intruder accesses, analyzes; (b) spoofs RFID transmissions to spoof the assailant, modify the data and provide the system with erroneous information (the method receives incorrect data that has been tampered with by the attacker); (c) sinkhole attack, which is one of the most popular types of attack (the assailant introduces a harmful node within the system and that many nodes are identified in one component of the system); and (d) assault of Sybil: the assailant inserts a wormhole attack within the system and the network node adopts numerous node identities. An encryption attack could be the source of yet another security breach. The primary goal of this violence is to gain the private key, which is required to communicate between two devices. The different types are (a) side-channel: in this attack, the attacker provides some additional information when transferring the information from user to server or vice versa; (b) cryptanalysis assaults: the assailant decrypts data from a reading form without knowing the key throughout this assault; and (c) middleman assault: the assailant monitors data by interfering with connectivity among nodes in the literature, there are a number of security suggestions. Conversely, because of current difficulties such as centralization, single point of failure and so on, security remains a source of concern in IoT networks. As a result, a novel and developing innovation known as ā€˜blockchain’ can be utilized in conjunction with IoT to improve IoT security. By addressing the problems in IoT, blockchain’s strong technologies may be applied to increase its performance and make it a more robust connection and centralized concerns in current security processes, and introduce the notion of decentralization through the blockchain system [3].
Blockchain is a decentralized point-to-point system without the need a someone else for transactions and communication [4]. All of the transactions are self-contained and separate from one another. The blockchain is the technology that underpins the popular and revolutionary concept of cryptocurrencies. Cryptocurrency is thought to be extremely safe and unhackable. The same blockchain technology can be applied to other networks to enhance security. The fresh and growing advent technologies in any industry can result in several concerns and challenges. As a result, identifying those concerns and obstacles is critical, particularly in the healthcare industry, where people’s lives are closely linked. The prospect of implementing blockchain and IoT in the healthcare industry is addressed in this chapter, as well as numerous new healthcare applications that can be created using these revolutionary technologies. The obstacles and issues associated with the use of these two developing innovations in the healthcare industry are then discussed in depth.
The other parts of this chapter include: Section 1.2 review related works; Section 1.3 discusses the IoT and blockchain integration in healthcare system. Section 1.4 focusses on the challenges, prospect and issues in blockchain and IoT integration for healthcare system. Section 1.5 discusses the proposed framework and how it works. Lastly, Section 1.6 recapitulates the research outcomes and proposal for future work.

1.2 Literature Review

In [5], the authors suggested the blockchain-based IoT Model to better systematically handle transactions performed through healthcare technologies. The MQTT protocol was recommended as the main agent for the architectural connection of biosensors with the IoT system. Furthermore, the architecture included the IPFS (Inter-Planetary File System), which may identify state entries or block modifications when certain transactions are affixed to the nodes, reducing the deduplication of the stored transactions. In [6], the authors presented an interactive environment for an IoT-controlled healthcare system. The suggested architecture is based on the ingestion of generating intelligent wearable gadgets and organic sensor readings, as well as providing patients with clear feedback and simple solutions. In [7], the paper presented an intelligent system in the clinic combining sensor performance with human sensors responses for speedier and timelier patient counselling. The proposal encourages the use of RFID, WSN, and wearable devices that operate on one channel to perform tasks such as intelligent detecting the patient’s ecosystem, patient allotments based on the criteria for doctor selection, patient monitoring and reporting cantered on model estimation. The authors in [8] designed a platform for the transmission of health information that outstrips the present approach by allowing for pseudonymity and safeguarding customer identity whose information is published and used by clinical study centres. The study also developed the notion of a Consensus Mechanism to ā€˜prove interoperability’ that enabled system-based companies to perform seamless and more effective operations completely based on compatibility inside the system. In addition, the researcher introduced a multi-architecture at different stages – the web service, which clinicians will use to submit and preserve the medical records, the cloud middleware, to preserve information from web fetching services via the REST API system and to call on Smart Contracts to perform the prescribed enrolment.
In a similar work, authors in [9] used the ACP Method that is deployed on the public blockchain, provides a parallel health ...

Table of contents

  1. Cover Page
  2. Half Title Page
  3. Series Page
  4. Title Page
  5. Copyright Page
  6. Contents
  7. Preface
  8. Book Organization
  9. About the Editor
  10. Contributors
  11. 1 Blockchain and Internet of Things in Healthcare Systems Prospects, Issues, and Challenges
  12. 2 Secure Digital Health Data Management in Internet of Things Using Blockchain and Machine Learning
  13. 3 Revolutionizing Healthcare by Coupling Unmanned Aerial Vehicles (UAVs) to Internet of Medical Things (IoMT)
  14. 4 Public Perception toward AI-Driven Healthcare and the Way Forward in the Post-Pandemic Era
  15. 5 Security, Privacy Issues, and Challenges in Adoption of Smart Digital Healthcare
  16. 6 Tapping the Big Data Analytics and IoT in the Pandemic Era
  17. 7 The Clinical Challenges for Digital Health Revolution
  18. 8 An Overview of Artificial Intelligence for Advanced Healthcare Systems
  19. 9 Future Trajectory of Healthcare with Artificial Intelligence
  20. 10 Artificial Intelligence and Public Trust on Smart Healthcare Systems
  21. 11 Role of Artificial Intelligence-Based Technologies in Healthcare to Combat Critical Diseases
  22. 12 Parkinson’s Disease Pre-Diagnosis Using Smart Technologies A Review
  23. 13 Emerging Technologies to Combat the COVID-19 Pandemic
  24. 14 The Role of Machine Learning and Internet of Things in Digital Health Transformation
  25. 15 Effective Remote Healthcare and Telemedicine Approaches for Improving Digital Healthcare Systems
  26. 16 Legal Implication of Blockchain Technology in Public Health
  27. Index