| Literature DB >> 35898077 |
Shynu Padinjappurathu Gopalan1, Chiranji Lal Chowdhary1, Celestine Iwendi2, Muhammad Awais Farid2, Lakshmana Kumar Ramasamy3.
Abstract
With the Internet of Things (IoT), mobile healthcare applications can now offer a variety of dimensionalities and online services. Disease Prediction Systems (DPS) increase the speed and accuracy of diagnosis, improving the quality of healthcare services. However, privacy is garnering an increasing amount of attention these days, especially concerning personal healthcare data, which are sensitive. There are a variety of prevailing privacy preservation techniques for disease prediction that are rendered. Nonetheless, there is a chance of medical users being affected by numerous disparate diseases. Therefore, it is vital to consider multi-label instances, which might decrease the accuracy. Thus, this paper proposes an efficient privacy-preserving (PP) scheme for patient healthcare data collected from IoT devices aimed at disease prediction in the modern Health Care System (HCS). The proposed system utilizes the Log of Round value-based Elliptic Curve Cryptography (LR-ECC) to enhance the security level during data transfer after the initial authentication phase. The authorized healthcare staff can securely download the patient data on the hospital side. Utilizing the Herding Genetic Algorithm-based Deep Learning Neural Network (EHGA-DLNN) can test these data with the trained system to predict the diseases. The experimental results demonstrate that the proposed approach improves prediction accuracy, privacy, and security compared to the existing methods.Entities:
Keywords: Gaussian Kernel-based linear discriminant analysis (GK-LDA); Internet of Things; authentication; disease prediction system (DPS); elephant herding genetic algorithm-based deep learning neural network (EHGA-DLNN); log of round value-based elliptic curve cryptography (LR-ECC); secure data transfer; substitution cipher
Mesh:
Year: 2022 PMID: 35898077 PMCID: PMC9332592 DOI: 10.3390/s22155574
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1Architecture diagram of the proposed methodology.
Figure 2(a) Encryption time and (b) decryption time graph for the proposed method.
Figure 3Security level analysis of the proposed LR-ECC methodology.
The proposed method’s performance with the existing approaches.
| Metrics | Proposed EHGA-DLNN | DLNN | ANN | KNN | SVM |
|---|---|---|---|---|---|
| Accuracy | 98.35 | 95.33 | 93.35 | 92.33 | 91.23 |
| Sensitivity | 97.33 | 95.56 | 92.32 | 90.45 | 89.33 |
| Specificity | 96.36 | 94.57 | 89.99 | 88.13 | 86.33 |
| Precision | 95.32 | 93.46 | 92.37 | 90.23 | 89.69 |
| Recall | 96.69 | 94.59 | 93.75 | 92.35 | 91.87 |
| F-measure | 96.37 | 94.57 | 93.35 | 92.97 | 91.12 |
Figure 4Comparative analysis of the proposed methodology with the existent methodologies.
Figure 5Precision, recall, and F-measure graph for the proposed methodology.