Blockchain-Integrated Authentication Framework for Secure Cloud-Based Health Monitoring with Wearable Devices
DOI:
https://doi.org/10.57159/jcmm.4.2.25197Keywords:
Blockchain Security, Cloud Authentication, Wearable Health Devices, Smart Contracts, Healthcare IoT, Anomaly DetectionAbstract
Wearable health monitoring devices play a critical role in real-time patient care, but their reliance on cloud-based services introduces significant security and privacy challenges. This study presents a blockchain-integrated security framework that combines decentralized authentication, smart contract automation, and end-to-end encryption to ensure the secure transmission and access of health data. Unlike traditional centralized systems, the framework uses a permissioned blockchain to log authentication and access events immutably, while smart contracts govern role-based permissions without manual oversight. The system was evaluated in a simulated environment with wearable devices and cloud infrastructure. Results demonstrate low-latency performance, high authentication accuracy, robust anomaly detection, and resilience against replay and spoofing attacks. This framework offers a scalable and transparent approach to strengthening data protection in digital healthcare systems.
References
S. Gupta, P. Chithaluru, T. Stephan, S. Nafisa, and S. Kumar, “Hspbci: A robust framework for secure healthcare data management in blockchain-based IoT systems,” Multimedia Tools and Applications, pp. 1–25, 2024.
L. Khajehzadeh, H. Barati, and A. Barati, “A lightweight authentication and authorization method in IoT-based medical care,” Multimedia Tools and Applications, pp. 1–40, 2024.
A. Altherwi et al., “A hybrid optimization approach for securing cloud-based e-health systems,” Multimedia Tools and Applications, pp. 1–36, 2024.
S. Ray, K. N. Mishra, and S. Dutta, “Security enhancements in m-health using distributed ledger technology-based digital locker system,” International Journal of Information Technology, vol. 16, pp. 4253–4271, 2024.
S. Ray, K. N. Mishra, and S. Dutta, “Security enhancements in m-health using distributed ledger technology based digital locker system,” International Journal of Information Technology, vol. 16, no. 7, pp. 4253–4271, 2024.
H. A. Al-Ghuraybi, M. A. AlZain, and B. Soh, “Ensuring authentication in medical cyber-physical systems: A comprehensive literature review of blockchain technology integration with machine learning,” Multimedia Tools and Applications, vol. 83, no. 12, pp. 35673–35707, 2024.
P. Rastogi, D. Singh, and S. S. Bedi, “An improved blockchain framework for ORAP verification and data security in healthcare,” Journal of Ambient Intelligence and Humanized Computing, vol. 15, no. 6, pp. 2853–2868, 2024.
H. Idrissi and P. Palmieri, “Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems,” The Journal of Supercomputing, vol. 80, no. 5, pp. 6622–6660, 2024.
S. Pandey and B. Bhushan, “Recent lightweight cryptography (LWC) based security advances for resource-constrained IoT networks,” Wireless Networks, vol. 30, no. 4, pp. 2987–3026, 2024.
Y. Harbi, K. Medani, and C. Gherbi, “A systematic literature review of blockchain technology for Internet of Drones security,” Arabian Journal for Science and Engineering, vol. 48, pp. 1053–1074, 2023.
K.-T. Zhu, Y. Wu, R. Yang, and Q. Yuan, “Anomaly detection in metaverse healthcare and fitness: Big data analytics using 6G-enabled Internet of Things,” Wireless Personal Communications, pp. 1–20, 2024.
A. Awasthi et al., “Machine learning-based D2D communication for a cloud-secure e-health system and data analysis by feature selection with classification,” Soft Computing, pp. 1–14, 2023.
S. Ksibi, F. Jaidi, and A. Bouhoula, “A comprehensive study of security and cyber-security risk management within e-health systems: Synthesis, analysis and a novel quantified approach,” Mobile Networks and Applications, vol. 28, no. 1, pp. 107–127, 2023.
P. K. Pal, M. Singh, and P. K. Mishra, “Fortified IoT-fog framework for enhanced healthcare intelligence,” Multimedia Tools and Applications, pp. 1–34, 2024.
S. M. Patil, B. S. Dakhare, S. M. Satre, and S. D. Pawar, “Blockchain-based privacy preservation framework for preventing cyberattacks in smart healthcare big data management systems,” Multimedia Tools and Applications, pp. 1–20, 2024.
S. Garg, R. K. Kaushal, and N. Kumar, “A novel design and performance assessment of a blockchain-powered remote patient monitoring system,” SN Computer Science, vol. 5, no. 7, p. 849, 2024.
S. Atiewi, A. Al-Rahayfeh, M. Almiani, A. Abuhussein, and S. Yussof, “Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks,” Cluster Computing, vol. 27, no. 4, pp. 4551–4568, 2024.
D. K, N. S, and A. A, “Security analysis and trends in signcryption for WBAN: A research study,” Peer-to-Peer Networking and Applications, 2024.
D. Balakrishnan and T. D. Rajkumar, “Enhanced mayfly with active elite approach clustering based deep Q learner routing with EBRLWE for IoT-based healthcare monitoring system,” Multimedia Tools and Applications, vol. 83, no. 39, pp. 87129–87152, 2024.
A. K. Ranjan and P. Kumar, “Ensuring the privacy and security of IoT-medical data: A hybrid deep learning-based encryption and blockchain-enabled transmission,” Multimedia Tools and Applications, vol. 83, no. 33, pp. 79067–79092, 2024.
C. Krishna, D. Kumar, and D. S. Kushwaha, “A comprehensive survey on pandemic patient monitoring system: Enabling technologies, opportunities, and research challenges,” Wireless Personal Communications, vol. 131, pp. 2125–2172, 2023.

Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2025 Journal of Computers, Mechanical and Management

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The Journal of Computers, Mechanical and Management applies the CC Attribution- Non-Commercial 4.0 International License to its published articles. While retaining copyright ownership of the content, the journal permits activities such as downloading, reusing, reprinting, modifying, distributing, and copying of the articles, as long as the original authors and source are appropriately cited. Proper attribution is ensured by citing the original publication.