Blockchain-Integrated Authentication Framework for Secure Cloud-Based Health Monitoring with Wearable Devices

Authors

  • Shaharkar Bhushan Bharat Department of Computer Science and Engineering, Mansarovar Global University, Sehore, Madhya Pradesh, India, 466001
  • Manoj E. Patil Department of Computer Science and Engineering, Mansarovar Global University, Sehore, Madhya Pradesh, India, 466001

DOI:

https://doi.org/10.57159/jcmm.4.2.25197

Keywords:

Blockchain Security, Cloud Authentication, Wearable Health Devices, Smart Contracts, Healthcare IoT, Anomaly Detection

Abstract

Wearable health monitoring devices play a critical role in real-time patient care, but their reliance on cloud-based services introduces significant security and privacy challenges. This study presents a blockchain-integrated security framework that combines decentralized authentication, smart contract automation, and end-to-end encryption to ensure the secure transmission and access of health data. Unlike traditional centralized systems, the framework uses a permissioned blockchain to log authentication and access events immutably, while smart contracts govern role-based permissions without manual oversight. The system was evaluated in a simulated environment with wearable devices and cloud infrastructure. Results demonstrate low-latency performance, high authentication accuracy, robust anomaly detection, and resilience against replay and spoofing attacks. This framework offers a scalable and transparent approach to strengthening data protection in digital healthcare systems.

References

S. Gupta, P. Chithaluru, T. Stephan, S. Nafisa, and S. Kumar, “Hspbci: A robust framework for secure healthcare data management in blockchain-based IoT systems,” Multimedia Tools and Applications, pp. 1–25, 2024.

L. Khajehzadeh, H. Barati, and A. Barati, “A lightweight authentication and authorization method in IoT-based medical care,” Multimedia Tools and Applications, pp. 1–40, 2024.

A. Altherwi et al., “A hybrid optimization approach for securing cloud-based e-health systems,” Multimedia Tools and Applications, pp. 1–36, 2024.

S. Ray, K. N. Mishra, and S. Dutta, “Security enhancements in m-health using distributed ledger technology-based digital locker system,” International Journal of Information Technology, vol. 16, pp. 4253–4271, 2024.

S. Ray, K. N. Mishra, and S. Dutta, “Security enhancements in m-health using distributed ledger technology based digital locker system,” International Journal of Information Technology, vol. 16, no. 7, pp. 4253–4271, 2024.

H. A. Al-Ghuraybi, M. A. AlZain, and B. Soh, “Ensuring authentication in medical cyber-physical systems: A comprehensive literature review of blockchain technology integration with machine learning,” Multimedia Tools and Applications, vol. 83, no. 12, pp. 35673–35707, 2024.

P. Rastogi, D. Singh, and S. S. Bedi, “An improved blockchain framework for ORAP verification and data security in healthcare,” Journal of Ambient Intelligence and Humanized Computing, vol. 15, no. 6, pp. 2853–2868, 2024.

H. Idrissi and P. Palmieri, “Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems,” The Journal of Supercomputing, vol. 80, no. 5, pp. 6622–6660, 2024.

S. Pandey and B. Bhushan, “Recent lightweight cryptography (LWC) based security advances for resource-constrained IoT networks,” Wireless Networks, vol. 30, no. 4, pp. 2987–3026, 2024.

Y. Harbi, K. Medani, and C. Gherbi, “A systematic literature review of blockchain technology for Internet of Drones security,” Arabian Journal for Science and Engineering, vol. 48, pp. 1053–1074, 2023.

K.-T. Zhu, Y. Wu, R. Yang, and Q. Yuan, “Anomaly detection in metaverse healthcare and fitness: Big data analytics using 6G-enabled Internet of Things,” Wireless Personal Communications, pp. 1–20, 2024.

A. Awasthi et al., “Machine learning-based D2D communication for a cloud-secure e-health system and data analysis by feature selection with classification,” Soft Computing, pp. 1–14, 2023.

S. Ksibi, F. Jaidi, and A. Bouhoula, “A comprehensive study of security and cyber-security risk management within e-health systems: Synthesis, analysis and a novel quantified approach,” Mobile Networks and Applications, vol. 28, no. 1, pp. 107–127, 2023.

P. K. Pal, M. Singh, and P. K. Mishra, “Fortified IoT-fog framework for enhanced healthcare intelligence,” Multimedia Tools and Applications, pp. 1–34, 2024.

S. M. Patil, B. S. Dakhare, S. M. Satre, and S. D. Pawar, “Blockchain-based privacy preservation framework for preventing cyberattacks in smart healthcare big data management systems,” Multimedia Tools and Applications, pp. 1–20, 2024.

S. Garg, R. K. Kaushal, and N. Kumar, “A novel design and performance assessment of a blockchain-powered remote patient monitoring system,” SN Computer Science, vol. 5, no. 7, p. 849, 2024.

S. Atiewi, A. Al-Rahayfeh, M. Almiani, A. Abuhussein, and S. Yussof, “Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks,” Cluster Computing, vol. 27, no. 4, pp. 4551–4568, 2024.

D. K, N. S, and A. A, “Security analysis and trends in signcryption for WBAN: A research study,” Peer-to-Peer Networking and Applications, 2024.

D. Balakrishnan and T. D. Rajkumar, “Enhanced mayfly with active elite approach clustering based deep Q learner routing with EBRLWE for IoT-based healthcare monitoring system,” Multimedia Tools and Applications, vol. 83, no. 39, pp. 87129–87152, 2024.

A. K. Ranjan and P. Kumar, “Ensuring the privacy and security of IoT-medical data: A hybrid deep learning-based encryption and blockchain-enabled transmission,” Multimedia Tools and Applications, vol. 83, no. 33, pp. 79067–79092, 2024.

C. Krishna, D. Kumar, and D. S. Kushwaha, “A comprehensive survey on pandemic patient monitoring system: Enabling technologies, opportunities, and research challenges,” Wireless Personal Communications, vol. 131, pp. 2125–2172, 2023.

Downloads

Published

30-04-2025

How to Cite

Bharat, S. B., & Patil, M. E. (2025). Blockchain-Integrated Authentication Framework for Secure Cloud-Based Health Monitoring with Wearable Devices. Journal of Computers, Mechanical and Management, 4(2), 40–48. https://doi.org/10.57159/jcmm.4.2.25197