ArticlePDF Available

Federated-Learning Based Privacy Preservation and Fraud-Enabled Blockchain IoMT System for Healthcare

Authors:

Abstract and Figures

These days, the usage of machine-learning-enabled dynamic Internet of Medical Things (IoMT) systems with multiple technologies for digital healthcare applications has been growing progressively in practice. Machine learning plays a vital role in the IoMT system to balance the load between delay and energy. However, the traditional learning models fraud on the data in the distributed IoMT system for healthcare applications are still a critical research problem in practice. The study devises a federated learning-based blockchain-enabled task scheduling (FL-BETS) framework with different dynamic heuristics. The study considers the different healthcare applications that have both hard constraint (e.g., deadline) and resource energy consumption (e.g., soft constraint) during execution on the distributed fog and cloud nodes. The goal of FL-BETS is to identify and ensure the privacy preservation and fraud of data at various levels, such as local fog nodes and remote clouds, with minimum energy consumption and delay, and to satisfy the deadlines of healthcare workloads. The study introduces the mathematical model. In the performance evaluation, FL-BETS outperforms all existing machine learning and blockchain mechanisms in fraud analysis, data validation, energy and delay constraints for healthcare applications.
Content may be subject to copyright.
2168-2194 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JBHI.2022.3165945, IEEE Journal of
Biomedical and Health Informatics
1
Federated-Learning Based Privacy Preservation and
Fraud-Enabled Blockchain IoMT System for
Healthcare
Abdullah lakhan ID , Mazin Abed Mohammed, Jan Nedoma, Radek Martinek, Prayag Tiwari ID , Ankit Vidyarthi ID ,
Ahmed Alkhayyat, and Weiyu Wang
Abstract—These days, the usage of machine-learning-enabled
dynamic Internet of Medical Things (IoMT) systems with mul-
tiple technologies for digital healthcare applications has been
growing progressively in practice. Machine learning plays a
vital role in the IoMT system to balance the load between
delay and energy. However, the traditional learning models fraud
on the data in the distributed IoMT system for healthcare
applications are still a critical research problem in practice.
The study devises a federated learning-based blockchain-enabled
task scheduling (FL-BETS) framework with different dynamic
heuristics. The study considers the different healthcare applica-
tions that have both hard constraint (e.g., deadline) and resource
energy consumption (e.g., soft constraint) during execution on
the distributed fog and cloud nodes. The goal of FL-BETS is to
identify and ensure the privacy preservation and fraud of data
at various levels, such as local fog nodes and remote clouds,
with minimum energy consumption and delay, and to satisfy
the deadlines of healthcare workloads. The study introduces
the mathematical model. In the performance evaluation, FL-
BETS outperforms all existing machine learning and blockchain
mechanisms in fraud analysis, data validation, energy and delay
constraints for healthcare applications.
Index Terms—IoMT, Federated Learning, Fraud-Analysis,
Blockchain, Fog, Cloud, Healthcare, Federated Learning, Privacy
Preservation.
I. INT ROD UC TI ON
The utilization of digital healthcare applications based on
the Internet of Medical Things (IoMT) system has been
increasing day by day [1]. The IoMT system collects different
Funding: This research work was partially supported by Ministry of
Education of Czech Republic (project No. SP2022/18 and SP2022/34).
(Corresponding author: Prayag Tiwari, Ankit Vidyarthi)
A. Lakhan is with the College of Computer Science and Artificial In-
telligence, Wenzhou University, Wenzhou 325035, China; E-mail: abdul-
lah@seu.edu.cn
M.A. Mohammed is with the College of Computer Science and Information
Technology, University of Anbar, Anbar 31001, Iraq; Email: mazinalshu-
jeary@uoanbar.edu.iq
J. Nedoma is with the Department of Telecommunications, VSB-
Technical University of Ostrava, 70800 Ostrava, Czech Republic; Email:
jan.nedoma@vsb.cz
R. Martinek is with the Department of Cybernetics and Biomedical
Engineering, VSB-Technical University of Ostrava , 70800 Ostrava, Czech
Republic; Email: radek.martinek@vsb.cz
P. Tiwari is with the Department of Computer Science, Aalto University,
Finland; Email: prayag.tiwari@ieee.org
A. Vidyarthi is with the Department of CSE&IT, Jaypee Institute of
Information Technology Noida, India; Email: dr.ankit.vidyarthi@gmail.com
A. Alkhayyat is with the College of technical engineering, The Islamic
University, Najaf, Iraq; Email: ahmedalkhayyat85@iunajaf.edu.iq
W. Wang is with the Business School of Changzhou University, China;
Email: weiyuwang001@gmail.com
medical devices, wireless technologies, and fog and cloud
nodes distributed throughout the network. The IoMT offers
different services to digital healthcare applications and is gen-
erally called IoT-enabled digital healthcare applications. This
digital healthcare consists of other applications in which IoT-
enabled services provide ubiquitous connectivity to the users
to monitor their healthcare 24/7. The digital healthcare IoT
applications store and migrate user data via different connected
nodes such as wireless technologies and fog and cloud comput-
ing nodes for processing. Artificial intelligence-enabled many
dynamic methods help applications manage their execution
and data storage in the IoT fog cloud network. Furthermore,
existing artificial intelligence techniques are proposed to deal
with the privacy preservation and fraud anomaly detection
issues in the network. IoT applications with blockchain pursue
various anomaly detection techniques on transactional network
data of a public financial blockchain called bitcoin [2]. This
blockchain-enabled solution is a prototype for a study that
examines anomaly detection in the context of blockchain
technology and its financial applications. It uses unsupervised
machine learning techniques to remove transactional data from
the bitcoin blockchain and analyze it for malicious transactions
[3].
Federated learning is an artificial intelligence paradigm that
concedes computing nodes to find out from a shared model
collaboratively. It works by allowing individual model training
on separate, independent IoMT data of applications while only
sharing the trained models, which do not contain any personal
data. The user devices train their applications data locally
and shared to the global computing model for execution.
This process is repeated for several iterations until a high-
quality model is generated [3]. The decentralized blockchain
is the technology that encourages the IoT applications to
execute at different nodes in the fog-cloud network [4]. The
blockchain technology can be implemented at the client-side
and server-side with different schemes such as smart-contract,
miners, consensus, and different fault-tolerant schemes [5].
However, static rules-based blockchain still suffers from dy-
namic frauds and scams, and the static learning process in
existing blockchain systems did not work efficiently in the
dynamic environment.
This paper formulates federated learning-based privacy pre-
serving and fraud detection-enable blockchain IoMT system
for healthcare applications in fog-cloud assisted network. The
study suggests a new system that leverages different technolo-
Authorized licensed use limited to: Southeast University. Downloaded on April 09,2022 at 00:17:01 UTC from IEEE Xplore. Restrictions apply.
2168-2194 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JBHI.2022.3165945, IEEE Journal of
Biomedical and Health Informatics
2
gies such as federated learning and blockchain technology
is a decentralized fog and cloud computing network. The
research reduces the security risk, energy, delay, and deadline
of applications. The study devises a new dynamic detection
Federated Learning-Based Fraud Detection-Enable Blockchain
System for IoT healthcare applications in Fog-Cloud. The
study divides the learning process into local learning models
at each fog node and then shared to the global master node
to efficiently deal with the entire system. The study formu-
lates this problem as the scheduling problem and makes the
following efforts to solve the considered problem.
The study devises a novel federated learning aware
fraud-detection enables blockchain IoMT system where
the fraud of data and validation of data and execution
energy and delay being minimized as shown in Figure
1. The system consists of different layers, such as an
application layer consisting of interrelated applications
that share data to process their goals in the network. The
fog-node layer consists of varying fog nodes federated
and fraud blockchain and trains the models at different
nodes to avoid any attack on the storage between various
transactions. The fog-cloud agent (FCA) is the master
node that schedules all requested work based on shared
models to the global federated learning model.
The research devises the framework-based FL-BETS con-
sisting of different heuristics to solve the problem in
different sub-steps. The heuristics are fraud detection,
blockchain scheme, and task scheduling in the frame-
work. The goal is to process the entire workload of
applications in a different process to validate their quality
of service requirements.
The study implemented fog nodes near the user applica-
tions to store and train the data to avoid dynamic fraud in
blockchain-enabled with hashing and different primitive.
The local train model shared their training model and the
FCA’s global train model to ensure the system’s overall
performance.
The scheduler is the dynamic, iterative method that
schedules all workloads’ must be completed with their
deadlines on to the different fog nodes based on their
training model and blockchain requirements. The sched-
uler is non-preemptive, which will not interrupt any
process during execution at the node. Rescheduling will
be possible whenever any failure occurs in the system.
The manuscript has the subsequent sections. Section 2
shows the efforts of existing studies in literature state of the art.
Section 3 shows the problem-solution based on the proposed
architecture, and section 4 shows algorithm implementation
based on heuristics steps. Section 5 determined the perfor-
mances of the proposed schemes with the considered problem.
Section 6 summarizes the effort of the proposed work with the
achievement of the results.
II. EX IS TI NG RE LATE D WOR K OF IOMT SY ST EM
These days, Internet of Medial Things (IoMT) system en-
abled applications are growing progressively to solve different
daily life issues. The most reason is that each traditional
application is connecting to the web via different sensors and
actuators. Whereas many traditional machine learning schemes
supported supervised, unsupervised, and reinforcement learn-
ing are proposed to coach the models of IoT data within the
fog cloud network. Blockchain technology is widely deployed
at distributed fog-cloud networks. However, the traditional
training model of machine learning suffered from overhead,
lateness, accuracy, and lots of factors during the training of
IoT workload within the system.
This work [1] devised the IoMT system based on different
machine learning models for the applications. Recently, feder-
ated learning solved the matter of the normal machine learning
model and trained the various models at local devices, and
shared with the most servers as wiped out for the healthcare
applications [6]. The most goal of this studies to train the
various models of applications at mobile devices during the
processing of healthcare applications. The CNN and KNN
based federated learning aware training models based sug-
gested in studies [2]–[4]. The goal is to attenuate the energy
consumption of devices during training the models locally and
share them with the near fog servers for further manipulations.
However, these studies still didn’t consider the security of
distributed computing.
Security and Privacy-aware federated learning supported
blockchain suggested in [5], [7], [8] for smart-home applica-
tions in the mobile edge cloud and fog computing. The goal is
to scale back the delay of applications and provide security to
the sensitive data of applications during processing outside the
devices. The energy optimization aware blockchain supported
federated learning-based system suggested in [9]–[11]. The
shared and native training models were considered because
the objective with the minimization of energy consumption
of mobile devices and communication networks. However,
existing virtual machine-based systems are still affected by
the delay.
The lightweight IoMT aware decentralized federated learn-
ing for E-healthcare applications suggested in [12]–[20]. The
goal is to attenuate the wait delay, service delay and validate
the info in several nodes. These studies suggested different
machine learning algorithms like deep reinforcement learn-
ing schemes that supported Markov Model and optimized
the multi-objective supported weighting and Pareto optimal.
However, the proposed work is different from the state of art
studies.
The studies [21]–[25] suggested the federated learning-
enabled technology in the fog cloud-aware IoT system was
devised for the different applications. These studies devised a
blockchain-enabled, secure data-sharing architecture for mul-
tiple parties. These studies devised the privacy of data is well-
maintained by sharing the data model instead of revealing
the actual data. Finally, we integrate federated learning into
the consensus process of permissioned blockchains so that the
computing work for consensus can also be used for federated
training. Numerical results derived from real-world datasets
show that the proposed data sharing scheme achieves good
accuracy, high efficiency, and enhanced security. However,
these studies only considered the homogeneous fog and cloud
nodes in their work. These studies considered intelligent
Authorized licensed use limited to: Southeast University. Downloaded on April 09,2022 at 00:17:01 UTC from IEEE Xplore. Restrictions apply.
2168-2194 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JBHI.2022.3165945, IEEE Journal of
Biomedical and Health Informatics
3
transport applications and industrial applications with the only
security constraint in their work. However, security, privacy,
and deadlines for healthcare applications are widely ignored
in work.
The study highlights the dynamic security and privacy
challenges and their solutions in the manuscript to the state-
of-the-art studies. The study devises federated learning-based
blockchain-enabled task scheduling (FL-BETS) in the IoMT
system for healthcare applications, which analyzes differ-
ent constraints for optimization, such as validation, delay,
and optimization under deadline for healthcare applications.
The closely related studies [18]–[20] suggested trust and
blockchian enabled for healthcare applications in the dis-
tributed network. However, they did not consider the delays,
fraud, energy, and deadline constraints of the problem inside
the formulation. These studies exploited traditional machine
learning models for training and testing inside the fog and
cloud nodes for healthcare IoT applications. However, these
models have a lot of consumption of resources, energy, and
time and often miss the deadlines for applications.
Federated-Learning Aware Training-Based Privacy Preser-
vation and Fraud-Enabled Blockchain The IoMT System
obtained authentication and authorization issues and threat
attacks. The federated learning approach enables the different
nodes to train and test their privacy and security models
independently and share them with the global model node
for processing. It is the more efficient mechanism used in
the traditional privacy and security mechanisms of machine
learning for IoMT applications.
III. PROP OS ED SO LU TI ON
The study devised the federated learning distributed training
modeling enabled privacy preserving and fraud detection in
blockchain enabled IoMT system for the Internet of Things
(IoT) healthcare applications as shown in Figure 1. The IoMT
system consists of applications, fog nodes, and fog-cloud
nodes with the container microservices. The system considered
the Inumber of IoT applications such as E-Healthcare, E-
Transport, and Smart-Homes. Each application iis coarse-
grained and fully offloads the workload Wito Fog-Cloud
Agent (FCA) for further processing. The number of computing
nodes Kare geographically distributed at different places in
the network. Each node kcan train the data model of all
IoT applications and can share with FCA and other nodes in
the network. The FCA decides on the trained model at local
fog nodes and achieves how to reduce applications’ energy
consumption and latency and execute them under their dead-
lines. The study devises FL-BETS algorithm framework that
consists of different dynamic heuristics as shown in Algorithm
1 This research uses machine learning to implement multiple,
self-improving, and maintainable fraud detection models. We
demonstrate how to train supervised and unsupervised machine
learning models on historical transactions to predict whether
incoming transactions are fraudulent or not.
A. Problem-Formulation of Research
In the research problem, the model consists of Inumber
of IoT healthcare applications, i.e., {i= 1, . . . , I}, where
Fog Cloud Agent (FCA)
ECG
Heartbeat
local Fog Model
E-Hospital
local Fog Model
Blood-
Pressure
local Fog Model
iTM1 iTM2 iTM3
TM1 TM2 TM3
FL-BETS
GTM
i=1 i=2 i=3
B1 B2 B3
K4.B4
k1 k2 k3
Local Fog Layer
IoT Healthcare Applications
Adaptive Training
Adaptive Testing
FL-Fraud Policy
Global Blockchain-Enabled Cloud Computing
Federated Learning Enabled IoMT System
Fig. 1: Federated Learning Aware Blockchain Enabled IoMT
for IoT Healthcare Applications.
{Wi= 1 I}demonstrates their workloads under their
deadlines Di. The proposed model consists of Inumber of
coarse-grained healthcare applications, e.g., {i= 1, . . . iI}.
For executing the workload, the study suggests the hybrid
paradigm enabled fog and cloud nodes that are represented by
{k= 1, . . . , K}with their different speed ζkand resources
r. The blockchain technology with schemes implemented
inside nodes with other blocks, e.g., {B= 1, . . . , N }. Each
blockchain blocks Binside the particular node khas various
attributes such as current block number, current hashing, pre-
vious hashing, transaction data, fraud enabled, and validation
schemes.
1) Security and Privacy Model: The study devised the
symmetric based security model inside blockchain technology
in which encryption and decryption done based on advance
encryption standard (AES). The blockchain technology by
default exploited SHA-256 security algorithm with the public
key and private key during blockchian mechanism during
distributed ledger data in fog cloud network. The study devised
the privacy model and analyzed the fraud detection to avoid
from any privacy issue in the work. The study train and
test the model based on federated learning in the distributed
Authorized licensed use limited to: Southeast University. Downloaded on April 09,2022 at 00:17:01 UTC from IEEE Xplore. Restrictions apply.
2168-2194 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JBHI.2022.3165945, IEEE Journal of
Biomedical and Health Informatics
4
TABLE I: Problem Notations
Notations Aims and Definition
ISet of healthcare coarse-grained applications
i ith workload of Iapplications
DiDeadline of the workload ias the hard constriant
WiWorkload of application i
KA set fog and cloud computing-nodes
kThe kth computing-node of K
kwatt Power consumption of node as the soft constraint
ϵkParticular kresource
ζkThe processing speed of node k
N, B A set of blockchains blocks and particular block
T MiTraining and testing model of workload i
xi,k,B Assignment of workload one at a time
blockchain technology.
2) Local Training Model and Blockchain: Initially, the
system will decide offloaded workload from IoMT application
finds particular node or not on the base of following equation.
xWi,k =Assign = 1,
NotAssigned = 0.(1)
Equation (1) determines the either offloaded workload has
been assigned to any particular node or waiting for assignment
in the system. After the workload assignment to any node,
the training and testing analysis sets are divided into training,
testing, and validation in the following way.
T raining =Wi
ζk
× {w= 1, . . . , Wi}.(2)
Equation (3) takes raw data (e.g., audio, video, image, text)
and identify them based on pattern of data and similar pattern
data store in the one cluster.
V alid =T raining ×Wi.(3)
Equation (3) validated the cluster workloads wiof similar
group based on their patterns in the system.
3) Global Model and Blockchain: The study introduces the
local and global validation based on blockchain mechanism in
the study. The goal is to reduce the security risk, delay and
processing cost of applications in the system. Table I) defines
the description of the symbols for the problem.
B. Placement of Fog and Cloud Nodes
The fog nodes are placed very near medical applications,
such as fog nodes located at different hospitals and offering
service at the localization. However, the centralized cloud is
located multiple hops away from user applications and has
high latency but less resource cost. The study considered
the heterogeneous fog cloud nodes as the joint optimization
resources for healthcare applications to keep the resource bal-
ance between fog nodes and cloud. All the fog and cloud nodes
are decentralized they can share data with the blockchian
hashing and make validation based on the proof of work
method.
C. Multi-Constraints Optimization of the Problem
The study considers the different constraints to formulate the
problem, such as data validation, accuracy, resource utilization
which are sets of the delay and processing cost objectives
functions.
D. Processing Delay
Initially, the study calculates the validation delay of data in
the following way.
V alidation Delay =xWi,k ×V alid. (4)
Equation (4) ensures the validation delay of the single work-
load in the system. The blockchain and execution are calcu-
lated in the following delay.
Execution Delay =Hashing time +Wi
ζk
×xWi,k
+F raud Analysis.
(5)
Equation (5) determines the execution delay of workload i.
Hashing time =Wik, B (SH A 256).(6)
Equation (6) determines the encryption and decryption inside
blockchain for workload i.
F raud Analysis =Wik , B Data index. (7)
Equation (7) determines the fraud analysis of workload i.
The power consumption nodes depends upon the blockchain
validation and fraud analysis for each workload to be deter-
mined in the following way. The total delay of workload to
be determined in the following way.
Delay =Execution Delay +H ashing time
+F raud Analysis. (8)
Equation (8) to be determined the all delays of workload i.
P ower Consumption =W att ×Delay. (9)
Equation (9) determines the power consumption due to all
execution, blockchain and fraud analysis process in the node
for workload. The problem mathematically formulated as
follows.
I
X
i=1
K
X
k=1
N
X
B=1
min Delay , P ower Consumption. (10)
Subject To
I
X
i=1
K
X
k=1
N
X
B=1
Wi, k, B Di,i= 1, . . . I . (11)
All workloads executed under their deadlines as determined
in equation (11).
I
X
i=1
K
X
k=1
N
X
B=1
Wi, k, B ϵk,k= 1, . . . K. (12)
All workloads executed under their resource limitation of
nodes as determined in equation (12).
Authorized licensed use limited to: Southeast University. Downloaded on April 09,2022 at 00:17:01 UTC from IEEE Xplore. Restrictions apply.
2168-2194 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JBHI.2022.3165945, IEEE Journal of
Biomedical and Health Informatics
5
IV. PROPOSED FL-BETS STRATEG Y FRAMEWORK
In this section, the study shows the processes of FL-
BETS framework which consists of different heuristics as
shown in Algorithm 1. The FL-BETS consists of different
processes and different schemes in the following way. The
study considered the workload assignment problem which is
to be solved in polynomial time that is workload deadline in
the work. Generally, all the workload assignment problem are
NP-Hard problem and to be solved within deadline. Algorithm
Algorithm 1: FL-BETS Algorithm
Input : I , W, T M, K ;
1begin
2for (i=1 to k=1 to K) do
3Call Algorithm 2 order all workload based on
their deadlines;
4Algorithm 2 accepts input at a time instead of
random arrival in the system;
5Sorting iWi,I;
6Searching and mapping kϵk, Di,K;
7Call Algorithm 3 to train and test the data on
different local nodes;
8Apply training and testing based on federated
learning at different nodes k, Wi, T M ;
9Call blockchain Algorithm 4 to store secure
data at different nodes with adaptive
validation;
10 End Inner condition
11 End main
1 takes the different constraints as the input, e.g., I, W, T M , K
and process them into different phases. Algorithm 1 is the
framework which consists of different strategies as discussed
in problem description and solve the problem in different steps.
Each strategy to be explained in different sub-sections.
A. Deadline Enabled Sorting and Scheduling
All the workloads have a fixed deadline and are known in
advance in our work. All the workloads are submitted together
in the system at a time. Therefore, all the workloads are
sorted and scheduled based on our work’s lowest deadline
first scheduling method. In this paper, the deadline enabled
scheduler which is the preemptive method that schedules
the workload based on its deadline and privacy and security
constraints. If the workload fails due to privacy or security
issues, the scheduler will reschedule the workload on the
different fog and cloud nodes highlighted in the manuscript.
Algorithm 2 sorts the all workloads based their deadlines.
All the nodes are sorting according to their energy and delay
constraints in network. All the workloads must be executed
under the available resources of nodes until and unless the
assigned workloads finished their executions.
B. FL-Fraud-Detection and security preserving Policy
Adaptive training and testing means training and testing
different models on different fog nodes and sharing them with
Algorithm 2: Delay, Energy and Deadline Efficient
Scheduling
Input : {i=1,. . . , I},{k=1,. . . ,K},
{T M = 1, . . . , T M };
1begin
2Schedule all workloads based on equation (5).
Check the validation resources based on equation
(12);
3Check the consumption of nodes based on equation
(9);
4if (Wiϵk)then
5Apply Schedule-list[ikT M ];
the centralized cloud for computation. Based on their training
and testing models, all the trained and tested workloads avoid
fraud attacks and privacy issues. The study devises the feder-
ated learning-enabled fraud detection (FL-Fraud) and privacy
preserving policy in which training and testing progress on
the healthcare workloads by analyzing the fraud detection in
the fog cloud environment as shown in Figure 2. The fog and
cloud nodes are implemented at different layers where local
federated models are trained on the fog nodes and shared to
the global cloud computing for the blockchain-enabled storage
in the system. FL-fraud trains the model to discover fraud
patterns based on proposed adaptive training and testing model
enabled federated learning-enabled policy. The model is self-
learning; it can adapt to new and unexpected fraud patterns.
The study categorized the fraud pattern into two mechanisms:
i=1
k=1
B1
BC
256-SHA Hash
TM1
i=2
k=2
B2
BC
256-SHA Hash
TM2
i=3
k=3
B1
BC
SHA-256 Hash
TM3
Adaptive
Testing
Adaptive
Testing
Adaptive
Testing
Adaptive
Training
Adaptive
Training
Adaptive
Training
k4=TM1, TM2, TM3
Storage
Global Cloud Computing
ECG Heartbeat
i=2
E-Hospital
i=1
Blood Pressure
i=3
Fraud-Analysis
Fraud-Analysis Fraud-Analysis
Fraud-Analysis
FL-Fraud Policy
Fig. 2: Federated Learning Fraud-Detection Analysis and
Policy.
known pattern and unknown pattern. The applications offload
their workloads to the locally available fog nodes for further
processing (e.g., training and testing) before execution to the
global node. The proposed algorithm initially assigned the
particular pattern to each workload and offloaded them to the
respective available fog nodes. The existing proof of work and
proof of stake consensus employ the smart-contract rule to
Authorized licensed use limited to: Southeast University. Downloaded on April 09,2022 at 00:17:01 UTC from IEEE Xplore. Restrictions apply.
2168-2194 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JBHI.2022.3165945, IEEE Journal of
Biomedical and Health Informatics
6
practice the fraud on data and validation between nodes in the
blockchain-enabled network. However, these are static rules;
therefore, machine learning-enabled fraud detection based on
random-forest has been implemented in the blockchain to
handle the dynamic fraud in the network. However, central
machine learning fraud-detection algorithms based on random-
forest, artificial neural network, and consensus validation has
delay issue in the centralized training and testing model
for the processing. Therefore, the proposed FL-Fraud policy
delays optimal and accurate handling of known and unknown
fraud in the system. In the algorithm, GT M represents the
Algorithm 3: Adaptive Training and Adaptive Testing
Input : Schedule-list[i= 1 k1T M to
W I KGT M ], F raud[list];
1begin
2foreach (i= 1 T M1.k1to IK.GT M )do
3if (iT M.k .Matched.Fr aud[list])then
4Training-iT M.k 80%.status=Tempt;
5Test-iTM .k 20%.status=Tempt;
6else
7iT M.k .status=Success;
8iT M.k to GT M k= 1, . . . , K ;
9End-Loop;
global training model based on federated learning, whereas
k.T M is the federated learning model of fog node in the
IoMT system. Algorithm 3 scheme determines any fraud if
there are any chances of tempered data between different
blocks in the blockchain network. Initially, all models train
at other nodes and share the fraud details and the master node
FCA in the system. This way, any dynamic fraud can detect
easily in the system. Algorithm 3 uses machine learning to
implement multiple, self-improving, and maintainable fraud
detection models. Algorithm 3 demonstrates supervised and
unsupervised machine learning models to train the local and
global model on historical transactions to predict whether
incoming transactions are fraudulent or not.
C. Federated Learning Enabled Fraud-Validation of
Blockchain Process and Consensus Method
In this session, the study shows the fraud and validation en-
abled blockchain process and consensus method for workloads
in the system. The existing blockchain consensus methods
widely ignored the delay and energy aspects while evaluating
the intrusion and validation of the nodes in the system. The
study devises the lightweight blockchain consensus, which
is delay and power-efficient and more effective to find the
intrusion and delay with minimum consumption.
The study devises the privacy preserving mechanism in
terms of malware detection in the system. The goal is to safe
data or access control of nodes from malware attacks in the
system. The time complexity of the method to be determined
by nnumber of searching rounds and nof improvement during
execution in the system. Therefore, it is equal to log(n×n)in
Algorithm 4: Federated Learning Enabled Fraud-
Validation and privacy preserving of Blockchain Policy
in Fog-Cloud Paradigms
Input : Schedule-list[ikT M ],{B= 1, . . . B},
Data
1begin
2Data=is fraud text to be included in original
workload;
3Pattern= Pattern of the encrypted and decrypted
data;
4Apply Encryption and Decryption based on
equation (6);
5Pattern=k, B, WiT M initial pattern of
encrypted workload;
6Pattern’=k, B, WiT M offloading from sensor
to local fog node;
7if (Pattern̸=Pattern’) then
8Apply security preserving;
9Determine the fraud based on equation (7);
10 PatternData (list of fraud or unknown
attack);
11 Determine the extra available resource based
on equation (12);
12 Determine the fraud analysis delay based under
the deadline based on equation (8) and
equation (11);
13 Determine the power consumption of fraud
analysis based on equation (9);
14 else
15 Train and validated Pattern on local fog nodes
based on (3) and (3) equations;
16 if (Pattern’̸=Pattern”) then
17 Analyze the fraud between local train models
to cloud storage model based on first given
condition;
the security and privacy method. Algorithm 4 determined the
fraud and validation analysis of workload at different nodes
and trained them locally and shared to the global node. As
shown in Figure 2, the study analyzes the fraud from local
sensor data to local train fog node with the hashing pattern and
fraud pattern. The initial pattern, e.g., pattern’ design during
adaptive local training and testing models (e.g., 80% training
and 20%) in the model. Then further sharing to the remote
cloud, the pattern” is matched on the original data without
affecting any intrusion or attacks. If there is an attack from
a list of intrusion data (e.g., data), the algorithm will recover
them until it gets the original pattern of a particular node.
V. EXPERIMENTAL SET TI NG A ND RE SU LTS
In this paper, the study devised the federated learning-
enabled policy to minimize the energy of fog-cloud nodes
and reduce the delay of applications in the blockchain-enabled
network. Malfeasance systems are constantly rising in an IoT-
enabled fog-cloud setting. Rule-based fraud detection systems
Authorized licensed use limited to: Southeast University. Downloaded on April 09,2022 at 00:17:01 UTC from IEEE Xplore. Restrictions apply.
2168-2194 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JBHI.2022.3165945, IEEE Journal of
Biomedical and Health Informatics
7
have traditionally been used to mitigate online fraud, but they
rely on a static collection of rules adaptive and intelligent
experts. This research uses machine learning to implement
multiple, self-improving, and maintainable fraud detection
models. We demonstrate how to train supervised and unsu-
pervised machine learning models on historical transactions to
predict whether incoming transactions are fraudulent or not.
We also explain how to deploy the models to a REST API
to incorporate into an existing business software framework
once trained. This paper widely exploits a demonstration of
the method using an anonymized data transactions dataset.
A. Privacy Preservation Fraud Data Provider Healthcare
Dataset for Experiment
One of the most severe issues facing Medicare is provider
fraud. According to the government, Medicare spending grew
tremendously due to Medicare claim fraud. Healthcare fraud
is an organized crime where peers, providers, physicians,
and beneficiaries, collaborate to file false claims. A thorough
examination of Medicare data has revealed many doctors
who commit fraud. They exploit vague diagnosis codes to
justify the most expensive treatments and drugs. The most
vulnerable institutions affected by these unethical acts are
insurance companies. As a result, insurance companies have
raised their prices, and healthcare is growing more expensive
by the day. Fraud and abuse in the healthcare system can take
various forms. The following are some of the most typical
types of provider fraud: (i) Charging for services that are
never rendered. (ii) Submitting a claim for the same service
twice. (iii) Falsifying information about the service delivered.
(iv) Billing for a more complicated or costly service than was
supplied. (v) Billing for a covered service when the service
was not performed.
This study aims to ”predict possibly fraudulent suppliers”
based on their claims. We will also find significant variables
that will aid in the detection of possibly fraudulent providers’
behavior. Furthermore, we will investigate fraudulent tenden-
cies in provider claims to better predict provider behavior in
the future. The Dataset’s Introduction, We’re looking at in-
patient claims, outpatient claims, and beneficiary information
for each provider for this project. Let’s look at their specifics:
(i) Inpatient Information reveals the claims filed for patients
admitted to hospitals. It also includes information such as their
admission and discharge dates, and they admit d diagnostic
code. (ii) Outpatient Information. This information reveals
the claims filed by patients who visit hospitals but are not
admitted. (iii) Information on the Beneficiary information such
as health conditions, region of residence, and so forth. Table
TABLE II: Nodes Specification of Resources
K ϵj(GB)Core ζj(MIPS) ϵk
k12000000 1 10000 10000PW
k2500000 1 5000 1000PW
k31000 1 1000 500PW
k4100000 4 10000 500000PW
II elaborate the resource specification of system with different
configuration, such as speed, memory, and power consumption
in study. The study exploited stratigraphic statistics tool to get
the graphical results on the generated data in the work.
B. Medical Application Workload
The study gets the three different workload as the coarse-
grained from Kaggle such as ECG heartbeat as images, E-
Heart videos and images and blood pressure as the numeric
text and process them in the system during execution. The
detail of workload shown in Table III. Table III also configured
TABLE III: IoMT Application Workload
i Input Wi(MB) DiFederated-Learning
i=1 Images-Tasks 1000(MB) 1000 (ms) TM1=500 (ms)
i=2 Videos-Tasks 1300(MB) 2000 (ms) TM2=700 (ms)
i=3 Text-Tasks 1028(MB) 2800 (ms) TM3=800 (ms)
the parameter setting of federated learning and its processing
and validation time as the values T M for the simulation in
the system.
C. Federated Learning Training Model
The study suggested the federated learning aware training
model with trained the different dataset of IoT applications
on different fog nodes and shared with the main server fog-
cloud agent (FCA). All nodes can train dataset model of
all applications and easily shared to each other as shown in
the following implementation. %beginlstlisting The source, as
mentioned earlier code defined the blockchain implementation
in IoT systems with different steps. The study implemented the
following baseline approaches in the experimental part, which
are closely similar to the proposed work and already discussed
in the related work part.
Baseline 1: These machine learning enable methods [1]–
[3], [6] inside blockchain technology for fraud detection
are widely exploited to train the healthcare model and
e-transport and smart-home models. Data mining is used
to classify automatically, cluster, and segment data and
uncover relationships and rules in the data that may in-
dicate intriguing trends, such as fraud tendencies. Expert
systems that encode expertise in the form of rules for
identifying fraud.
Baseline 2: These dynamic machine learning methods [4],
[5], [7]–[9] are widely exploited to train the healthcare
model and e-transport and smart-home models. The study
implemented all traditional machine learning training
models and implemented blockchain, including schedul-
ing and energy efficiency in fog-cloud methods.
D. Fraud Analysis
Figure 3 shows the performances of the proposed algorithm
on the fraud data in the system. From Figure 3 it can be
observed that, initially, the ratio of fraud and delay is high
such as 60 to 80. After that, the system learns the adaptive
training and testing and improves both the fraud ratio and
delay with the minimum loss as shown in Figure 3.
Authorized licensed use limited to: Southeast University. Downloaded on April 09,2022 at 00:17:01 UTC from IEEE Xplore. Restrictions apply.
2168-2194 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JBHI.2022.3165945, IEEE Journal of
Biomedical and Health Informatics
8
Fig. 3: Adaptive Training and Testing Fraud Data.
(a)
600 800 1000 1200
Number of Workloads
0
5
10
15
20
25
Training Delay in Minutes
TMLA
FL-BETS
FTMLA
(b)
Fig. 4: Delay Performance of IoMT Applications With
Different Numbers of Tasks.
E. Result Discussions and Performances of Proposed Schemes
The study conducted the experimental based on different
components such as latency objective with the deadline,
blockchain-enable accuracy and resource leakage performance
of blocks, and energy efficiency of nodes during execution in
the system. Figure 4(a) shows the delay performances while
using the proposed scheme FL-BETS as compared to baseline
1 and baseline 2 during the processing of IoT applications
on the different computing nodes. The main reason is that
all existing studies only focused on resource scalability in-
stead of resource utilization while scheduling workloads on
machines. Another perspective is that the FL-BETS trains the
models at different fog nodes for each IoT workload, with
a minimum training delay instead of a centralized training
model. Therefore, federated learning-enabled distributed fog-
cloud scheduling training optimally compared to a centralized
machine learning training model in terms of delay. Figure
4 (b) the training delay performances of existing training
machine learning algorithm (TMLA) for IoT applications
with workload executions. In contrast, the Fully Training
Machine Learning Algorithm (FTMLA) is widely used to
train the offloaded data on single scalable nodes. However,
these centralized nodes incur long train delays if the number
of IoT applications increases in the system. Therefore, the
FL-BETS distributed training model, e.g., federated learning
model, gained optimal results compared to the existing training
model in terms of delay in the system. Figure 5 (a) shows
the power consumption due to fraud analysis and execution
performances of the scheduling with the training model for
IoMT applications in the system. Figure 5 (b) shows the
power consumption during blockchain validation in nodes
in both figures; the results show that the federated learning
consumes less power for data training as compared to the
existing centralized training model for IoMT applications.
Figure 6 (a) and (b) shows the delay performance during
(a)
200 400 600 800 1000
Number of Workloads
0
5
10
15
20
25
30
35
40
45
50
Power Consumption in Watt
Baseline1
FL-BETS
Baseline2
(b)
200 400 600 800
Number of Workloads
0.32
0.34
0.36
0.38
0.4
0.42
0.44
0.46
0.48
0.5
Blockchain Validity Energy Consumption in Watt
Baseline1
FL-BETS
Baseline2
Fig. 5: Energy Consumption of IoMT During Fraud Analysis
and Execution With Different Numbers of Tasks.
(a)
200 400 600 800
Number of Workloads
0
2
4
6
8
10
12
14
16
Blockchian Delay in Minutes
TBC
FL-BETS
ATBC
(b)
200 400 600 800
Number of Workloads
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
2
Blockchain-Leakage
Baseline1
FL-BETS
Baseline2
Fig. 6: Blockchain Performances of IoMT Applications With
Anomaly Detection Performances on Different Tasks.
blockchain verification and resource leakage in the distributed
network. The existing traditional blockchain (TBC) algorithm
and active traditional blockchain (ATBC) are widely exploited
in the distributed fog-cloud network. However, they trained
the fraud and security and proof of credibility, sake, and work
cases on single centralized nodes in the peer-to-peer network.
It will face a lot of delay for IoMT applications. Therefore, in
this case, FL-BETS outperforms all existing schemes in terms
of delay in the blockchain process in distributed fog-cloud for
IoMT applications in the system. Besides energy consumption,
delay, blockchain validation, privacy preservation and fraud-
detection performance in the distributed fog-cloud nodes for
IoMT, the deadline is also more critical in IoMT applications
during scheduling in the system. Figure 7 (a) and (b) show
the delay-performances of IoMT applications with the baseline
approaches, e.g., baseline 1 and baseline and proposed scheme
FL-BETS. At the same time, the delay of IoMT applications
with the distributed federated enabled framework FL-BETS
(a)
200 400 600 800
Number of Workloads
0.9
1
1.1
1.2
1.3
1.4
1.5
1.6
Deadline Missed Ratio
Baseline1
FL-BETS
Baseline2
(b)
200 400 600 800
Number of Workloads
2.5
3
3.5
4
4.5
5
5.5
6
6.5
7
7.5
8
Deadline Missed Ratio
Baseline1
FL-BETS
Baseline2
Fig. 7: Delay Performance of IoMT Applications With
Different Numbers of Tasks With Anomaly Detection.
Authorized licensed use limited to: Southeast University. Downloaded on April 09,2022 at 00:17:01 UTC from IEEE Xplore. Restrictions apply.
2168-2194 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JBHI.2022.3165945, IEEE Journal of
Biomedical and Health Informatics
9
(a)
400 600 800 1000 1200
(a) Application Workloads
0
5
10
15
Delay in Minutes
Baseline1
FL-BETS
Baseline2
(b)
400 600 800 1000 1200
(a) Application Workloads
0
5
10
15
Delay in Minutes
Baseline1
FL-BETS
Baseline2
Fig. 8: Deadline Performance of IoMT Applications With
Different Schemes in Blockchain-Enabled Network.
incurred lower end-to-end delay in the system as compared to
existing schemes. The only reason is that, for each application,
the FL-BETS train model at local nodes is shared to global
nodes for further scheduling. This way, overall delay can be
minimized for IoMT applications. Furthermore, Figure 8 (a)
and (b) show the deadline performances of IoMT applications
besides delay in the system. The results show that FL-BETS
outperforms all existing schemes regarding missing deadlines
and the satisfied deadline for IoMT applications in the system.
F. Finding and Limitation
In the current proposed IoMT system, the study devised
the federated learning-enabled distributed learning process in
a blockchain-enabled IoMT system for different healthcare
workloads. The objective is to minimize privacy and security
issues with the minimum processing time and processing cost
in IoMT work. The study devised the FL-BETS algorithm
framework, which consisted of different methods and achieved
the considered objective with optimal results. However, dy-
namic and run-time unknown attacks are more challenging
for the IoMT and were not considered in this work. Our
subsequent work will consider the adaptive malware-enabled
federated learning method in the blockchain-aware IoMT
system.
VI. CO NC LU SI ON
As shown in the discussion section, the proposed (FL-
BETS) framework minimized energy consumption by 41%
and delay by 28%. The study introduced the mathematical
model. In the performance evaluation, FL-BETS outperforms
all existing machine learning and blockchain mechanisms in
fraud analysis, data validation, energy and delay constraints
for healthcare applications.
The study find the privacy and security issues with the
minimum consumption of the resources in the proposed work
as existing machine learning models did not achieve the
effective utilization of resources in their model and incurred
with the high energy, delay and cost in the system.
In future work, the study will focus on awareness of
mobility fraud and anomaly detection for civil maritime ap-
plications in the blockchain-enabled fog-cloud network. The
cost functions will be determined widely for the system’s
ubiquitous and distributed security constraints. Furthermore,
the proposed system will consider the blockchain-enabled
federated learning methods and the deep-learning decision
model for both preemptive and non-preemptive aspects.
REF ER EN CE S
[1] P. Bhowal, S. Sen, J. H. Yoon, Z. W. Geem, and R. Sarkar, “Choquet
integral and coalition game-based ensemble of deep learning models
for covid-19 screening from chest x-ray images,” IEEE Journal of
Biomedical and Health Informatics, vol. 25, no. 12, pp. 4328–4339,
2021.
[2] Y. Zhou, B. Wang, X. He, S. Cui, and L. Shao, “Dr-gan: Conditional
generative adversarial network for fine-grained lesion synthesis on
diabetic retinopathy images,” IEEE Journal of Biomedical and Health
Informatics, 2020.
[3] Y. Qu, L. Gao, T. H. Luan, Y. Xiang, S. Yu, B. Li, and G. Zheng,
“Decentralized privacy using blockchain-enabled federated learning in
fog computing,” IEEE Internet of Things Journal, vol. 7, no. 6, pp.
5171–5183, 2020.
[4] A. H. Sodhro, N. Zahid, L. Wang, S. Pirbhulal, Y. O. Ouzrout,
A. Sekhari, A. V. L. Neto, A. R. L. De Macedo, and V. H. C.
De Albuquerque, “Towards ml-based energy-efficient mechanism for
6g enabled industrial network in box systems,” IEEE Transactions on
Industrial Informatics, 2020.
[5] R. Saha, S. Misra, and P. K. Deb, “Fogfl: Fog assisted federated learning
for resource-constrained iot devices,” IEEE Internet of Things Journal,
2020.
[6] Z. Lian, W. Wang, and C. Su, “Cofel: Communication-efficient and
optimized federated learning with local differential privacy,” in ICC
2021-IEEE International Conference on Communications. IEEE, 2021,
pp. 1–6.
[7] X. Wang, L. T. Yang, Y. Wang, L. Ren, and M. J. Deen, “Adtt: A highly
efficient distributed tensor-train decomposition method for iiot big data,
IEEE Transactions on Industrial Informatics, vol. 17, no. 3, pp. 1573–
1582, 2020.
[8] S. Hosseinalipour, C. G. Brinton, V. Aggarwal, H. Dai, and M. Chiang,
“From federated to fog learning: Distributed machine learning over
heterogeneous wireless networks,” IEEE Communications Magazine,
vol. 58, no. 12, pp. 41–47, 2020.
[9] H. Shao, M. Xia, G. Han, Y. Zhang, and J. Wan, “Intelligent fault
diagnosis of rotor-bearing system under varying working conditions with
modified transfer convolutional neural network and thermal images,
IEEE Transactions on Industrial Informatics, vol. 17, no. 5, pp. 3488–
3496, 2020.
[10] P. K. Sharma, J. H. Park, and K. Cho, “Blockchain and federated
learning-based distributed computing defence framework for sustainable
society,Sustainable Cities and Society, vol. 59, p. 102220, 2020.
[11] X. Lu, Y. Liao, P. Lio, and P. Hui, “Privacy-preserving asynchronous
federated learning mechanism for edge network computing,” IEEE
Access, vol. 8, pp. 48 970–48 981, 2020.
[12] X. Zhao and C. Huang, “Microservice based computational offloading
framework and cost efficient task scheduling algorithm in heterogeneous
fog cloud network,” IEEE Access, vol. 8, pp. 56 680–56 694, 2020.
[13] A. Lakhan and X. Li, “Transient fault aware application partition-
ing computational offloading algorithm in microservices based mobile
cloudlet networks,” Computing, vol. 102, no. 1, pp. 105–139, 2020.
[14] W. Dou, W. Tang, B. Liu, X. Xu, and Q. Ni, “Blockchain-based mobility-
aware offloading mechanism for fog computing services,Computer
Communications, vol. 164, pp. 261–273, 2020.
[15] A. Lakhan, M. Ahmad, M. Bilal, A. Jolfaei, and R. M. Mehmood, “Mo-
bility aware blockchain enabled offloading and scheduling in vehicular
fog cloud computing,” IEEE Transactions on Intelligent Transportation
Systems, 2021.
[16] P.-H. C. Chen, Y. Liu, and L. Peng, “Healthcare dataset in machine
learning,” Nature materials, vol. 18, no. 5, pp. 410–414, 2019.
[17] Y. Zhang, Z. Zheng, H.-N. Dai, and D. Svetinovic, “Guest editorial:
Special section on [U+0093]blockchain for industrial internet of
things[U+0094] in ieee transactions on industrial informatics,” IEEE
Transactions on Industrial Informatics, vol. 15, no. 6, pp. 3514–3515,
2019.
[18] S. Farshidi, S. Jansen, S. Espa˜
na, and J. Verkleij, “Decision support
for blockchain platform selection: Three industry case studies,” IEEE
Transactions on Engineering Management, vol. 67, no. 4, pp. 1109–
1128, 2020.
Authorized licensed use limited to: Southeast University. Downloaded on April 09,2022 at 00:17:01 UTC from IEEE Xplore. Restrictions apply.
2168-2194 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JBHI.2022.3165945, IEEE Journal of
Biomedical and Health Informatics
10
[19] J. Lockl, V. Schlatt, A. Schweizer, N. Urbach, and N. Harth, “Toward
trust in internet of things ecosystems: Design principles for blockchain-
based iot applications,” IEEE Transactions on Engineering Management,
vol. 67, no. 4, pp. 1256–1270, 2020.
[20] G. Fortino, F. Messina, D. Rosaci, and G. M. Sarn´
e, “Using blockchain
in a reputation-based model for grouping agents in the internet of things,”
IEEE Transactions on Engineering Management, vol. 67, no. 4, pp.
1231–1243, 2019.
[21] Y. Lu, X. Huang, Y. Dai, S. Maharjan, and Y. Zhang, “Blockchain and
federated learning for privacy-preserved data sharing in industrial iot,
IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 4177–
4186, 2019.
[22] S. R. Pokhrel and J. Choi, “Federated learning with blockchain for au-
tonomous vehicles: Analysis and design challenges,” IEEE Transactions
on Communications, vol. 68, no. 8, pp. 4734–4746, 2020.
[23] U. Majeed and C. S. Hong, “Flchain: Federated learning via mec-enabled
blockchain network,” in 2019 20th Asia-Pacific Network Operations and
Management Symposium (APNOMS). IEEE, 2019, pp. 1–4.
[24] D. C. Nguyen, M. Ding, Q.-V. Pham, P. N. Pathirana, L. B. Le,
A. Seneviratne, J. Li, D. Niyato, and H. V. Poor, “Federated learning
meets blockchain in edge computing: Opportunities and challenges,”
IEEE Internet of Things Journal, 2021.
[25] Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, “Blockchain
empowered asynchronous federated learning for secure data sharing
in internet of vehicles,” IEEE Transactions on Vehicular Technology,
vol. 69, no. 4, pp. 4298–4311, 2020.
Authorized licensed use limited to: Southeast University. Downloaded on April 09,2022 at 00:17:01 UTC from IEEE Xplore. Restrictions apply.
... The study recommended using dynamic algorithms with FL-BETS, a blockchain-enabled task scheduling system by Lakhan et al. [9,10]. On distributed fog and cloud nodes, healthcare applications with hard constraints (like dates) and soft constraints (like energy use) are looked at. ...
... Rights reserved.Evolutionary Intelligence6.2 Performance metric and simulation parametersTime to Execute: Average time to execute per each task is computed using the Eqs. (8),(9), and (10).Makespan Time: The time needed to accomplish the tasks. Makespan is computed using Eq. ...
Article
Full-text available
The Internet of Medical Things (IoMT) is a version of the Internet of Things. It is getting the attention of researchers because it can be used in a wide range of smart healthcare systems. One of the main advancements employed recently is the IoMT-cloud, which allows users to access cloud services remotely over the internet. These cloud services require an efficient task scheduling approach that satisfies the Quality of Service parameters with a low energy consumption. This paper presents an overview of the integration of IoMT and cloud computing technologies. Besides,this work proposes an efficient Extended Water Wave Optimization (EWWO) task scheduling in the IoMT Cloud for healthcare applications. EWWO algorithm performs based on its operations propagation, refraction and breaking. The proposed EWWO scheduling technique minimizes the energy consumption, makespan time, execution time and increases the resource utilization. Cloudsim simulator is used to simulate the IoMT-Cloud environment to verify the effectiveness of EWWO technique. The performance has been evaluated based on various parameters such as energy consumption, makespan time and execution time.
... This problem is particularly acute for critically ill patients in intensive care, where timely and effective BG management is crucial [6]. Given that population models can address the cold start problem [7], the emergence of Federated Learning (FL) might offer a promising solution to this challenge, especially in gathering population features while regarding data privacy [8,9]. ...
Preprint
Newly diagnosed Type 1 Diabetes (T1D) patients often struggle to obtain effective Blood Glucose (BG) prediction models due to the lack of sufficient BG data from Continuous Glucose Monitoring (CGM), presenting a significant "cold start" problem in patient care. Utilizing population models to address this challenge is a potential solution, but collecting patient data for training population models in a privacy-conscious manner is challenging, especially given that such data is often stored on personal devices. Considering the privacy protection and addressing the "cold start" problem in diabetes care, we propose "GluADFL", blood Glucose prediction by Asynchronous Decentralized Federated Learning. We compared GluADFL with eight baseline methods using four distinct T1D datasets, comprising 298 participants, which demonstrated its superior performance in accurately predicting BG levels for cross-patient analysis. Furthermore, patients' data might be stored and shared across various communication networks in GluADFL, ranging from highly interconnected (e.g., random, performs the best among others) to more structured topologies (e.g., cluster and ring), suitable for various social networks. The asynchronous training framework supports flexible participation. By adjusting the ratios of inactive participants, we found it remains stable if less than 70% are inactive. Our results confirm that GluADFL offers a practical, privacy-preserving solution for BG prediction in T1D, significantly enhancing the quality of diabetes management.
... A notable example that aligns with these principles is the fog-IoT-based approach for medical services (Baucas, Spachos, & Plataniotis, 2023), which integrates a private blockchain mechanism to regulate access rights, guaranteeing interactions between trusted devices and the local training and global knowledge base of the predictive model. Similarly, an FL-based system for fraud detection, empowered by Blockchain (Lakhan et al., 2023), applies privacypreserving measures and detection of fraud algorithms across various Fog-Cloud endpoints. ...
Chapter
The field of smart healthcare has witnessed a remarkable revolution propelled by recent advancements in communication technologies, complemented by pivotal support techniques, including artificial intelligence (AI) and the Internet of Health Things (IoHT). Traditional AI approaches, which relied on centralized data gathering and processing, have proven impractical and unattainable within the healthcare domain due to the expanding scale of healthcare domain networks and escalating privacy concerns. Addressing these challenges, federated learning (FL), an emerging distributed and collaborative technique, appears as a potential solution to assuage security and privacy concerns associated with conventional AI methodologies. By enabling the training of machine learning (ML) models on decentralized data stored across a myriad of devices, such as smartphones and IoT devices, FL schemes facilitate the analysis and interpretation of data originating from diverse wearable devices, including fitness trackers, smartwatches, and implantable healthcare devices such as pacemakers, while upholding the privacy and security of the underlying devices and raw data. Consequently, this study focuses on elucidating the prevailing security and privacy challenges encountered when deploying FL in the context of IoHT while delving into various techniques for implementing and enhancing the security and privacy of FL within the healthcare realm. We extensively explore privacy-preserving techniques such as differential privacy (DP), homomorphic encryption (HE), secure multi-party computation (SMC), and other methodologies that bolster the security and privacy of FL in the healthcare sector. Furthermore, we shed light on promising avenues for future research in secure FL within the IoHT landscape. This comprehensive analysis promises valuable insights for researchers, students, and stakeholders deeply invested in this burgeoning field.
... Federated Learning (FL) has been heralded as a significant step forward in addressing these issues, allowing for the development of shared predictive models by leveraging data distributed across multiple locations without the need to pool it centrally [5], [6]. Nevertheless, current state-ofthe-art (SOTA) FL systems still confront intrinsic challenges such as trust deficits among participants, secure aggregation of models, and susceptibility to adversarial disruptions. ...
Article
Full-text available
Medical healthcare centers are envisioned as a promising paradigm to handle vast data for various disease diagnoses using artificial intelligence. Traditional Machine Learning algorithms have been used for years, putting the sensitivity of patients' medical data privacy at risk. Collaborative data training , where multiple hospitals (nodes) train and share encrypted federated models, solves the issue of data leakage and unites resources of small and large hospitals from distant areas. This study introduces an innovative framework that leverages blockchain-based Federated Learning to identify 15 distinct lung diseases, ensuring the preservation of privacy and security. The proposed model has been trained on the NIH Chest Ray dataset (112 120 X-Ray images), tested, and evaluated, achieving test accuracy of 92.86%, a latency of 43.518625 ms, and a throughput of 10034017 bytes/s. Furthermore, we expose our framework blockchain to stringent empirical tests against leading cyber threats to evaluate its robustness. With resilience metrics consistently nearing 87% against three evaluated cyberattacks, the proposed framework demonstrates significant robustness and potential for healthcare applications. To the best of our knowledge, this is the first paper on the practical implementation of blockchain-empowered FL with such data and several diseases, including multiple disease coexistence detection.
... IP-based communication is utilized in IoT to connect sensors and a wide range of devices to the Internet. Remote monitoring, early diagnosis, treatment, and prevention, for instance, can be achieved by healthcare sectors using the Internet of Things [1]. In addition, in the Internet of Things, objects or individuals were outfitted with sensors and actuators for status monitoring, such as RFID tags. ...
Article
Full-text available
Dispersed, patient-centered care is rapidly replacing hospital- and specialist-focused healthcare. A combination of 5G, 6G, and Internet of Things (IoT) devices, fog and cloud computing, and cloud of things (CoT) are anticipated to be incorporated into future smart healthcare networks. The sixth-generation telecommunications standard, or 6G, is currently being developed for cellular data network-supporting wireless technologies. Medical sensors can collect a lot of data, making it hard to find the most useful information. A calculation for a body sensor network is required to detect exceptions in the gathered information. Techniques for machine learning and measurable examining can be utilized in the examination cycle. Ongoing reaction enhancement is a developing field, as an ever-increasing number of computationally serious errands are offloaded to the backend. This study proposes a novel method for a deep learning-based fog computing-based privacy-preserving healthcare application. Fog computing module was used to collect the healthcare data in this case, and quantum federated regressive bayes neural networks were used to improve security. Latency, communication overhead, quality of service (QoS), transmission time, average access delay, and network cost are all taken into account in the experimental analysis. Using dataset and hospital patient records, various experiments for proposed model yield the experimental results.
... This data sharing is the primary challenge for applications like healthcare and finance. In drug discovery of IoMT, multiple medical organisations can train models using their respective datasets while patient data privacy is retained [142]. This approach aids in enhancing the accuracy through inputs from multiple models and aggregating the inputs to get the global model, which can be accurate and robust. ...
Article
The Internet of Medical Things (IoMT) has emerged as a paradigm shift in healthcare, integrating the Internet of Things (IoT) with medical devices, sensors, and healthcare systems. From peripheral devices that monitor vital signs to remote patient monitoring systems and smart hospitals, IoMT provides a vast array of applications that empower healthcare professionals. However, the integration of IoMT presents numerous obstacles, such as data security, privacy concerns, interoperability, scalability, and ethical considerations. For the successful integration and deployment of IoMT, addressing these obstacles is essential. Federated Learning (FL) permits collaborative model training while maintaining data privacy in distributed environments like IoMT. By incorporating Explainable Artificial Intelligence (XAI) techniques, the resulting models become more interpretable and transparent, enabling healthcare professionals to comprehend the underlying decision-making processes. This integration not only improves the credibility of Artificial Intelligence models but also facilitates the detection of biases, errors, and peculiar patterns in the data. The combination of FL and XAI contributes to the development of more privacy-preserving, trustworthy, and explainable AI systems, which are essential for the development of dependable and ethically sound IoMT applications. Hence, the aim of this paper is to conduct a literature review on the amalgamation of FL and XAI for IoMT.
Article
Full-text available
Hospitals, clinics, pharmaceutical firms, diagnostics centres, pathology labs, insurance companies, and emergency vehicles must be connected in a unified system to better serve patients worldwide with cutting-edge medical care. Most previously existing systems rely on cloud-based platforms, which face several technological challenges, including data availability, data accessibility, processing delays, scalability concerns, problems gathering real-time data, and difficulties monitoring patients. Information about a person’s health is extremely private and should be protected with the utmost care. To address these issues, We propose a decentralised, secure, and efficient framework incorporating the internet of things, fog computing, and blockchain technology to collect, process, manage, and store healthcare data. A unique role-based access control is used in the proposed framework to prioritise critically ill patients while maintaining confidentiality, scalability, data availability, and system security. Finally, we evaluate the efficiency of our proposed framework by conducting experiments on device registration time, transaction latency, transaction throughput, and access control in medical environments using realistic healthcare scenarios. We then compare the results to existing fog models to determine the system’s performance.
Article
Blockchain has gained significant interest because of its inherent characteristics—decentralization, integrity, immutability, interoperability, transparency, and trustworthiness. Additionally, Blockchain has the potential to revolutionize the healthcare sector, ushering in a novel era. This survey presents some novel insights into blockchain-based electronic health record systems. Its aim is to present the research discoveries regarding the present state of blockchain technology in diverse healthcare application contexts. This paper presents a theoretical survey of various reputed research papers and white papers representing successful implementation. It helps the researchers to assess and understand blockchain-enabled healthcare systems properly. This detailed survey analysis presents the contribution of existing works from the perspective of identified challenges and their respective solutions. This paper presents a graphical survey analysis based on research findings, which helps identify some future exploratory directions for proper research work.
Article
Full-text available
Under the present circumstances, when we are still under the threat of different strains of coronavirus, and since the most widely used method for COVID-19 detection, RT-PCR is a tedious and time-consuming manual procedure with poor precision, the application of Artificial Intelligence (AI) and Computer-Aided Diagnosis (CAD) is inevitable. In this work, we have analyzed Chest X-ray (CXR) images for the detection of the coronavirus. The primary agenda of this proposed research study is to leverage the classification performance of the deep learning models using ensemble learning. Many papers have proposed different ensemble learning techniques in this field, some methods using aggregation functions like Weighted Arithmetic Mean (WAM) among others. However, none of these methods take into consideration the decisions that subsets of the classifiers take. In this paper, we have applied Choquet integral for ensemble and propose a novel method for the evaluation of fuzzy measures using Coalition Game Theory, Information Theory, and Lambda fuzzy approximation. Three different sets of Fuzzy Measures are calculated using three different weighting schemes along with information theory and coalition game theory. Using these three sets of fuzzy measures three Choquet Integrals are calculated and their decisions are finally combined.We have created a database by combining several image repositories developed recently. Impressive results on the newly developed dataset and the challenging COVIDx dataset support the efficacy and robustness of the proposed method. To the best of our knowledge, our experimental results outperform many recently proposed methods. Source code available at https://github.com/subhankar01/Covid-Chestxray-lambda-fuzzy
Article
Full-text available
Mobile edge computing (MEC) has been envisioned as a promising paradigm to handle the massive volume of data generated from ubiquitous mobile devices for enabling intelligent services with the help of artificial intelligence (AI). Traditionally, AI techniques often require centralized data collection and training in a single entity, e.g., an MEC server, which is now becoming a weak point due to data privacy concerns and high data communication overheads. In this context, federated learning (FL) has been proposed to provide collaborative data training solutions, by coordinating multiple mobile devices to train a shared AI model without exposing their data, which enjoys considerable privacy enhancement. To improve the security and scalability of FL implementation, blockchain as a ledger technology is attractive for realizing decentralized FL training without the need for any central server. Particularly, the integration of FL and blockchain leads to a new paradigm, called FLchain, which potentially transforms intelligent MEC networks into decentralized, secure, and privacy-enhancing systems. This article presents an overview of the fundamental concepts and explores the opportunities of FLchain in MEC networks. We identify several main topics in FLchain design, including communication cost, resource allocation, incentive mechanism, security and privacy protection. The key solutions for FLchain design are provided, and the lessons learned as well as the outlooks are also discussed. Then, we investigate the applications of FLchain in popular MEC domains, such as edge data sharing, edge content caching and edge crowdsensing. Finally, important research challenges and future directions are also highlighted.
Article
Full-text available
In the Internet of vehicular Things (IoVT), the microservices applications such as Self-Driving, Augmented-Reality, E-Transport and E-Healthcare have diverse quality of service requirements (QoS). The hybrid fog-cloud environment is largely adopted solution to fulfil the diverse QoS requirements of mixed application tasks. However, the security of offloaded data is mainly overlooked. This paper aims to provide an efficient secure task scheduling scheme in vehicular fog-cloud networks (VFCN). The objective is to minimize the system cost (e.g., communication and computation cost) by considering the constraints such as, security, mobility, required CPU, and deadline. The task scheduling problem can be formulated as a convex optimization problem, where the objective of the problem is a convex function and constraints are convex sets. Hence, this work proposed a Mobility Aware Blockchain Enabled offloading scheme (MABOS) to ensure the security of tasks, and also proposed a Local Search Based Task Scheduling (LSBTS) algorithm, which determines optimal resource selection and scheduling for offloaded tasks under given constraints. Finally, the experimental results show that suggested methods outperform in term of costs as compared to existing up-to-date methods.
Article
Full-text available
In this paper, we propose a fog-enabled federated learning framework – FogFL – to facilitate distributed learning for delay-sensitive applications in resource-constrained IoT environments. While Federated Learning (FL) is a popular distributed learning approach, it suffers from communication overheads and high computational requirements. Moreover, global aggregation in FL relies on a centralized server, prone to malicious attacks, resulting in inefficient training models. We address these issues by introducing geospatially placed fog nodes into the FL framework as local aggregators. These fog nodes are responsible for defined demographics, which help share location-based information for applications with similar environments. Further, we formulate a greedy heuristic approach for selecting an optimal fog node for assuming a global aggregator’s role at each round of communication between the edge and cloud, thereby reducing the dependence on the execution at the centralized server. Fog nodes in the FogFL framework reduce communication latency and energy consumption of resource-constrained edge devices without affecting the global model’s convergence rate, thereby increasing the system’s reliability. Extensive deployment and experimental results corroborate that, in addition to a decrease in global aggregation rounds, FogFL reduces energy consumption and communication latency by 92% and 85%, respectively, as compared to state-of-the-art.
Conference Paper
Federated learning can collaboratively train a global model without gathering clients' private data. Many works focus on reducing communication cost by designing kinds of client selection methods or averaging algorithms. But they all consider whether the client will participate or not, and the training time could not be reduced as data size of update for each client is not changed. We proposed COFEL, a novel federated learning system that can both reduce the communication time by layer-based parameter selection and enhance the privacy protection by applying local differential privacy mechanism on the selected parameters. We present COFEL-AVG algorithm for global aggregation and designed layer-based parameter selection method which can select the valuable parameters for global aggregation to optimize the communication and training process. And it can reduce the update data size as only selected part will be transferred. We compared with traditional federated learning system and CMFL which also applies a parameter selection method but model-based and performed experiments on MNIST, Fashion-MNIST and CIFAR-10 to verify the effectiveness of COFEL. The results denoted that it can improve at most 22.8\% accuracy compared with CMFL on CIFAR-10 and reduce around 20\% and 48\% training time to reach an accuracy of 0.85 compared with traditional FL and CMFL on Fashion-MNIST dataset.
Article
Machine learning (ML) tasks are becoming ubiquitous in today's network applications. Federated learning has emerged recently as a technique for training ML models at the network edge by leveraging processing capabilities across the nodes that collect the data. There are several challenges with employing conventional federated learning in contemporary networks, due to the significant heterogeneity in compute and communication capabilities that exist across devices. To address this, we advocate a new learning paradigm called fog learning, which will intelligently distribute ML model training across the continuum of nodes from edge devices to cloud servers. Fog learning enhances federated learning along three major dimensions: network, heterogeneity, and proximity. It considers a multi-layer hybrid learning framework consisting of heterogeneous devices with various proximities. It accounts for the topology structures of the local networks among the heterogeneous nodes at each network layer, orchestrating them for collaborative/cooperative learning through device-to-device communications. This migrates from star network topologies used for parameter transfers in federated learning to more distributed topologies at scale. We discuss several open research directions toward realizing fog learning.
Article
Diabetic retinopathy (DR) is a complication of diabetes that severely affects eyes. It can be graded into five levels of severity according to international protocol. However, optimizing a grading model to have strong generalizability requires a large amount of balanced training data, which is difficult to collect, particularly for the high severity levels. Typical data augmentation methods, including random flipping and rotation, cannot generate data with high diversity. In this paper, we propose a diabetic retinopathy generative adversarial network (DR-GAN) to synthesize high-resolution fundus images which can be manipulated with arbitrary grading and lesion information. Thus, large-scale generated data can be used for more meaningful augmentation to train a DR grading and lesion segmentation model. The proposed retina generator is conditioned on the structural and lesion masks, as well as adaptive grading vectors sampled from the latent grading space, which can be adopted to control the synthesized grading severity. Moreover, a multi-scale spatial and channel attention module is devised to improve the generation ability to synthesize small details. Multi-scale discriminators are designed to operate from large to small receptive fields, and joint adversarial losses are adopted to optimize the whole network in an end-to-end manner. With extensive experiments evaluated on the EyePACS dataset connected to Kaggle, as well as the FGADR dataset, we validate the effectiveness of our method, which can both synthesize highly realistic ( $1280 \times 1280$ ) controllable fundus images and contribute to the DR grading task.
Article
Mobile users could offload some computations from the mobile devices to the nearby geo-distributed Fog servers which are provided by Fog computing infrastructure to release the computation workloads, and therefore improve quality of experience for themselves. However, mobile users may mistakenly offload their computations to the Fog servers which have been injected by some attackers, and these compromised Fog servers would possibly establish man-in-the-middle attack during the offloading procedure, and therefore induce privacy leaking and security issues. Meanwhile, as most of mobile users have natural mobility features, there still needs mobility-aware offloading technique for improving the offloading efficiency. Also, for Fog computing provider, to charge service fees for offloading service in a distributed fashion is necessary for providing geo-distributed offloading service. All of these challenges above motivate us to bring blockchain technique into Fog computing so as to verify authenticity of each Fog server. Hence, we propose a new Blockchain-based Mobility-aware Offloading (i.e., BMO) mechanism in this paper and we modeled the offloading problem in our proposed environment. Concretely, our BMO constantly maintains a set of candidate authorized Fog servers by leveraging blockchain, and the offloading decision could be made in a real-time fashion in mobile devices according to mobility prediction of users. Experimental results have demonstrated the feasibility and efficiency of BMO.
Article
Machine learning (ML) techniques in association to emerging sixth generation (6G) technologies i.e., massive internet of things (mIoT), big data analytics have caught too much attention from academia to the business world since last few years due to their high and fast computing capabilities. The role of ML-based 6G techniques is to reshape the imaginary idea into physical world for resolving the challenging issues of energy, QoS and QoE. Besides, ML techniques with better association to 6G reshapes the industrial network in box (NIB) platform. In the mean-time rapidly increasing market of the IoT devices to deliver multimedia content has caught the attention of various fields such as, industrial, and healthcare. The challenging issue that end-users are facing is the unsatisfactory and annoyed performance of portable devices while surfing the video, and image to/from desired entity i.e., low quality of experience (QoE). To resolve these issues this research first, proposes a novel ML-driven mobility management method (MMMM) for the efficient communication in industrial NIB
Article
The existing intelligent fault diagnosis methods of rotor-bearing system mainly focus on vibration analysis under steady operation, which has low adaptability to new scenes. In this paper, a new framework for rotor-bearing system fault diagnosis under varying working conditions is proposed by using a modified convolutional neural network (CNN) with transfer learning. First, infrared thermal images are collected and used to characterize the health condition of rotor-bearing system. Second, modified CNN is developed by introducing stochastic pooling and Leaky rectified linear unit to overcome the training problems in classical CNN. Finally, parameter transfer is used to enable the source modified CNN to adapt to the target domain, which solves the problem of limited available training data in the target domain. The proposed method is applied to analyze thermal images of rotor-bearing system collected under different working conditions. The results show that the proposed method outperforms other cutting edge methods in fault diagnosis of rotor-bearing system.