Abstract
Internet of Things (IoT) can be used in the healthcare sector to exchange patients' information, but there are many concerns about the privacy and security of the patients' confidential information or transferring this information. Data integrity is difficult to ensure since generated data from IoT devices are split into parts and stored in numerous edge servers in various locations. Data loss and improper data storage in edge servers make it difficult to ensure data integrity. The various security challenges and data integrity of edge computing can be handled by integrating blockchain (BC) technologies. BC paradigm provides a new infrastructure and security rules to enable IoT devices to get trusted interoperability for information and business. So, many healthcare institutions based on BC technology have the ability for data storage and support trust. This work aims to presents an IoT-Edge framework for the exchange of data without changing utilizing data processing and BC techniques. IoT devices can monitor follow the patient's status remotely and subsequently overcome the possibility of difficult cases. The proposed system presents many healthcare institutions' features by providing the complete preservation of patients' data with its confidential transmission and submits the results of the patient examination safely. The proposed system is user-friendly and offers the required utilities for integrity and confidentiality of information. Some simulation and performance experiments are conducted; the findings indicate an acceptable performance as an IoT-Edge framework based on BC technology.
















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Aazam EN et al. (2014) Fog computing and smart gateway based communication for cloud of things innovative cloud and security lab
Ai Y, Peng M, Zhang K (2018) Edge computing technologies for Internet of Things: a primer. Digital Commun Netw 4:77–86
Alonso RS (2013) Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks, ScienceDirect
Applebaum B (2017) Arithmetic Cryptography
Asim M (2017) A survey on application layer protocols for Internet of Things (IoT). Int J Adv Res Comput Sci 8(3):996–1000
Bahga A, Madisetti VK (2016) Blockchain platform for industrial. JSEA. https://doi.org/10.4236/jsea.2016.910036
Biswas K and Muthukkumarasamy V (2016) Securing Smart Cities Using Blockchain Technology," 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1392–1393, https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0198.
Bocek T, Rodrigues BB, Strasser T, and Stiller B (2017) Blockchains everywhere_A use-case of blockchains in the pharma supply-chain,'' in Proc. IFIP/IEEE Symp. Integr. Netw. Service Manage. (IM), Lisbon, Portugal, pp. 772_777. https://doi.org/10.23919/INM.2017.7987376
Bonomi F, Milito R, Zhu J, and Addepalli S (2012) Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing (MCC '12). Association for Computing Machinery, New York, NY, USA, 13–16. DOI:https://doi.org/10.1145/2342509.2342513.
Brumley D (2005) Remote timing attacks are practical," ScienceDirect
Burhan M (2018) IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey," MDPI
Cai H, Xu B, Jiang L, Vasilakos AV (2017) IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J 4(1):75–87. https://doi.org/10.1109/JIOT.2016.2619369
Carlos Salazar KKP (2016) Internet of Things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges," IJESC
Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of blockchain-based applications: current status, classification and open issues. Telematics Inform 36:55–81
Chandrashekhar K (2016) Internet of Things (IoT) Characteristics," Linkedin, 19 September. [Online]. https://www.linkedin.com/pulse/internet-things-iot-characteristics-kavyashree-g-c
Chang J (2018) Blockchain design for supply chain management
Chen H, Heidari AA, Chen H, Wang M, Pan Z, Gandomi AH (2020) Multi-population differential evolution-assisted Harris hawks optimization: Framework and case studies. Futur Gener Comput Syst 111:175–198
Chen L, Xu L, Shah N, Gao Z, Lu Y, Shi W (2017) On security analysis of proof-of-elapsed-time (PoET). In: Spirakis P, Tsigas P (eds) Stabilization, safety, and security of distributed systems. SSS 2017. Lecture Notes in Computer Science. Springer, Cham
Chen H (2019) A survey on ethereum systems security: vulnerabilities, attacks and defenses
Chendeb N, Khaled N, Agoulmine N (2020) Integrating Blockchain with IoT for a Secure Healthcare Digital System. 8th International Workshop on ADVANCEs in ICT Infrastructures and Services (ADVANCE 2020), Candy E. Sansores, Universidad del Caribe, Mexico, Nazim Agoulmine, IBISC Lab, University of Evry - Paris -Saclay University, Jan 2020, Cancún, Mexico. pp.1–8. ffhal-02495262f
Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the Internet of Things. IEEE Access. https://doi.org/10.1109/ACCESS.2016.2566339
Conti M (2016) A survey of man in the middle attacks," IEEE
Čolaković A, Hadžialić M (2018) Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues. Comput Netw 144:17–39
DIY Raspberry Pi Cryptocurrency Node. [Online]. http://raspnode.com/. (Accessed 1 February 2018).
Datla D et al (2012) Wireless distributed computing: a survey of research challenges. IEEE Commun Mag 50(1):144–152. https://doi.org/10.1109/MCOM.2012.6122545
Debus J (2017) Consensus method in blockchain system
Delmolino K, Arnett M, Kosba A, Miller A, Shi E (2016) Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. In: Clark J, Meiklejohn S, Ryan P, Wallach D, Brenner M, Rohloff K (eds) Financial cryptography and data security. FC 2016. Lecture notes in computer science. Springer, Berlin, Heidelberg, pp 79–94. https://doi.org/10.1007/978-3-662-53357-4_6
Dorri A, Kanhere SS, Jurdak R and Gauravaram P (2017) Blockchain for IoT security and privacy: The case study of a smart home," 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618-623, https://doi.org/10.1109/PERCOMW.2017.7917634
El_Rahman SA, Almayouf RY, Alghamdi ST, Almutairi AS, Chehab SM, Alasmari BM and Altherw RH (2020) Edge Cloud-IoT Framework based on Blockchain”, 2020 International Conference on Computer and Information Sciences (ICCIS), October 13 – 15, Aljouf, Saudi Arabia
Elazhary H (2019) Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2018.10.021
Ethereum Computer Built On Embedded Devices. [Online]. http://ethembedded.com/
Feng Y, Deb S, Wang G, Alavi AH (2021) Monarch butterfly optimization: a comprehensive review. Expert Syst Appl 168:114418. https://doi.org/10.1016/j.eswa.2020.114418
Fernández-Caramés TM, Fraga-Lamas P (2018) A review on the use of blockchain for the Internet of Things. IEEE Access 6:32979–33001. https://doi.org/10.1109/ACCESS.2018.2842685
Filipova N (2018) Blockchain – an opportunity for developing new business models
Fotiou N and Polyzos GC (2018) Smart contracts for the Internet of Things: opportunities and challenges”, 2018 European Conference on Networks and Communications (EuCNC), Ljubljana, Slovenia, Slovenia, https://doi.org/10.1109/EuCNC.2018.8443212
Gaur N (2018) Hands-on blockchain with hyperledger
González-Briones A (2018) GreenVMAS: virtual organization based platform for heating greenhouses using waste energy from power plants. MDPI. https://doi.org/10.3390/s18030861
Greenberger M (2019) Block what? The unrealized potential
Gui T, Ma C, Wang F and Wilkins DE (2016) Survey on swarm intelligence based routing protocols for wireless sensor networks: An extensive study," 2016 IEEE International Conference on Industrial Technology (ICIT), pp. 1944-1949, https://doi.org/10.1109/ICIT.2016.7475064
Gupta S (2016) Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art," CrossMark
Hameed K, Bajwa IS, Sarwar N, Anwar W, Mushtaq Z, Rashid T (2021) Integration of 5G and block-chain technologies in smart telemedicine using IoT. J Healthcare Eng. https://doi.org/10.1155/2021/8814364
Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H (2019) Harris hawks optimization: algorithm and applications [J]. Futur Gener Comput Syst 97:849–872
Hileman G (2017) Global Blockchain Benchmarking Study
Hyperledger (2018) Advancing business blockchain adoption through global open source collaboration 2018. [Online]. https://www.hyperledger.org/.
IBM (2018) Why new off-chain storage is required for Blockchains," IBM Storage
Ibrahim DS (2019) Enhancing Cloud Computing Security using Cryptography & Steganography
Ismailisufi A, Popović T, Gligorić N, Radonjic S, & Šandi S (2020) A private blockchain implementation using multichain open source platform. https://doi.org/10.1109/IT48810.2020.9070689.
Jayasinghe U (2019) TrustChain: a privacy preserving blockchain with edge computing
Kanakam P (2019) Intramural analysis of blockchain
Karafiloski E and Mishev A (2017) Blockchain solutions for big data challenges: a literature review," IEEE EUROCON 2017 -17th International Conference on Smart Technologies pp. 763–768, https://doi.org/10.1109/EUROCON.2017.8011213
Khan M, Salah K (2017) IoT security: review, blockchain solutions, and open challenges. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2017.11.022
Khattak HA (2019) Perception layer security in Internet of Things," ScienceDirect
Kombe C, Dida M, Sam A (2018). A review on healthcare information systems and consensus protocols in blockchain technology. International Journal of Advanced Technology and Engineering Exploration. 5. 473–483. https://doi.org/10.19101/IJATEE.2018.547023.
Kuo TT (2019) Comparison of blockchain platforms: a systematic review and healthcare examples
Lea P (2018) Internet of Things for architects
Li S, Chen H, Wang M, Heidari AA, Mirjalili S (2020b) Slime mould algorithm: a new method for stochastic optimization. Futur Gener Comput Syst 111:300–323. https://doi.org/10.1016/j.future.2020.03.055
Li J, Lei H, Alavi AH, Wang G-G (2020a) Elephant herding optimization: variants, hybrids, and applications. Mathematics 8(9):1415. https://doi.org/10.3390/math8091415
Li R, Song T, Mei B, Li H, Cheng X, Sun L (2019) Blockchain for large-scale Internet of Things data storage and protection. IEEE Trans Serv Comput 12(5):762–771. https://doi.org/10.1109/TSC.2018.2853167
Li W, Wang GG, Gandomi AH (2012) A survey of learning-based intelligent optimization algorithms. Arch Computat Methods Eng. https://doi.org/10.1007/s11831-021-09562-1
Liu Y, Wang K, Lin Y, Xu W (2019) $\mathsf{LightChain}$: a lightweight blockchain system for industrial Internet of Things. IEEE Trans Industr Inf 15(6):3571–3581. https://doi.org/10.1109/TII.2019.2904049
Lomotey RK, Pry J, Sriramoju S, Kaku E, Deters R (2017) Wearable IoT data architecture. IEEE World Congr Serv (SERVICES) 2017:44–50. https://doi.org/10.1109/SERVICES.2017.17
Lueth KL (2015) IoT basics: getting started with the Internet of Things," IoT Analytics, Online] https://iot-analytics.com/
Macdonald M (2017) The blockchain: a comparison of platforms and their uses beyond Bitcoin
Marjani M et al (2017) Big IoT data analytics: architecture, opportunities, and open research challenges. IEEE Access 5:5247–5261. https://doi.org/10.1109/ACCESS.2017.2689040
Maroufi (2019) "On the Convergence of Blockchain and Internet of Things (IoT) Technologies
Moin S, Karim A, Safdar Z, Safdar K, Ahmed E, Imran M (2019) Securing IoTs in distributed blockchain: analysis, requirements and open issues,". Future Gener Comput Syst 100:325–343
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. [Online]. http://www.ildgroup.si/uploads/product/20/bitcoin.pdf
Novo O (2018) Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J 5(2):1184–1195. https://doi.org/10.1109/JIOT.2018.2812239
Ouaddah A (2017) FairAccess: a new Blockchain-based access control framework for the Internet of Things
Pahl C (2018) A decision framework for blockchain platforms for IoT and edge Computing
Panarello A (2018) Blockchain and IoT integration: a systematic survey
Perboli G, Musso S, Rosano M (2018) "Blockchain in logistics and supply chain: a lean approach for designing real-world use cases. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2875782
Posey B (2017) Computer exploit," Search Security, September. [Online]. Available: https://searchsecurity.techtarget.com/definition/exploit.
Preden JS, Tammemäe K, Jantsch A, Leier M, Riid A, Calis E (2015) The benefits of self-awareness and attention in fog and mist computing. Computer 48(7):37–45. https://doi.org/10.1109/MC.2015.207
Puthal D (2016) Threats to Networking Cloud and Edge Datacenters in the Internet of Things, IEEE
Rajeev S, Geetha G (2012) Cryptographic hash functions: a review. Int J Comput Sci Issues 9:461–479
Rejeb A (2019) Leveraging the Internet of Things and blockchain technology in supply chain management
Ren Y (2019) Secure data storage based on blockchain and coding in edge computing
Reyna A (2018) On blockchain and its integration with IoT. Challenges and opportunities
Ruckebusch P (2016) Gitar: generic extension for internet-of-things architectures enabling dynamic updates of network and application modules
Russell B and Van Duren D (2016) Practical Internet of Things Security
Salahuddin MA, Al-Fuqaha A, Guizani M, Shuaib K, Sallabi F (2017) Softwarization of Internet of Things infrastructure for secure and smart healthcare. Computer 50(7):74–79. https://doi.org/10.1109/MC.2017.195
Samaniego M and Deters R (2016) Hosting virtual IoT resources on edge-hosts with blockchain, 2016 IEEE International Conference on Computer and Information Technology (CIT), pp. 116-119, https://doi.org/10.1109/CIT.2016.71.
Seok B, Park J, Park JH (2019) A lightweight hash-based blockchain architecture for industrial IoT. Appl Sci 9(18):3740. https://doi.org/10.3390/app9183740
Shae Z and Tsai JJP (2017) On the design of a blockchain platform for clinical trial and precision medicine," 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, pp. 1972–1980, doi: https://doi.org/10.1109/ICDCS.2017.61.
Sharam A (2018) Comparative analysis of cryptographic hash functions. Cryptographic hash functions
Shi S, He D, Li L, Kumar N, Khan MK, Choo KR (2020) Applications of blockchain in ensuring the security and privacy of electronic health record systems: a survey. Comput Secur 97:101966. https://doi.org/10.1016/j.cose.2020.101966
Sittón-Candanedo I (2019) A review of edge computing reference architectures and a new global edge proposal, ScienceDirect
Sittón-Candanedo I (2019) IoT Standards and Protocols," 11 January. [Online]. https://www.postscapes.com/internet-of-things-protocols/.
Suárez-Albela M, Fernández-Caramés TM, Fraga-Lamas P, Castedo L (2017) A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications. Sensors 17(9):1978. https://doi.org/10.3390/s17091978
Taherkordi A (2013) Optimizing sensor network reprogramming via in situ reconfigurable components
Tang J (2018) Intelligent mobile projects with TensorFlow: intelligent mobile projects with TensorFlow: Build 10+ artificial intelligence apps using TensorFlow mobile and lite for iOS, android, and raspberry Pi”, Kindle Edition, Packt
Wang GG (2018) Moth search algorithm: a bio-inspired metaheuristic algorithm for global optimization problems. Memetic Comp 10:151–164. https://doi.org/10.1007/s12293-016-0212-3
Wang G-G, Deb S, Coelho L (2015) Earthworm optimization algorithm: a bio-inspired metaheuristic algorithm for global optimization problems. Int J Bio-Inspired Comput. https://doi.org/10.1504/IJBIC.2015.10004283
Wang GG, Gandomi AH, Alavi AH et al (2019) A comprehensive review of krill herd algorithm: variants, hybrids and applications. Artif Intell Rev 51:119–148. https://doi.org/10.1007/s10462-017-9559-1
Wang X, Zha X, Ni W, Liu RP, Guo YJ, Niu X, Zheng K (2019) Survey on blockchain for Internet of Things”. Comput Commun 136:10–29. https://doi.org/10.1016/j.comcom.2019.01.006
Wang L (2019) Cryptographic primitives in blockchains p. 45
Wu Z, Meng Z, Gray J (2017) IoT-based techniques for online M2M-interactive itemized data registration and offline information traceability in a digital manufacturing system. IEEE Trans Industr Inf 13(5):2397–2405. https://doi.org/10.1109/TII.2017.2704613
Yousefpour A (2019) All one needs to know about fog computing and related edge computing paradigms: a complete survey, ScienceDirect
Zhang S (2019) Analysis of the main consensus protocols of blockchain
Zhang H (2019) Object tracking for a smart city using iot and edge computing MDPI
Acknowledgements
This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program. The authors thank all participants especially Almayouf RY, Alghamdi ST, Almutairi AS, Chehab, SM, Alasmari BM and Altherw RH.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
None to declare.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
ElRahman, S.A., Alluhaidan, A.S. Blockchain technology and IoT-edge framework for sharing healthcare services. Soft Comput 25, 13753–13777 (2021). https://doi.org/10.1007/s00500-021-06041-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-021-06041-4