BLOCK CHAIN BASED SMART HEALTHCARE SYSTEMS IN 5G NETWORKS

The 5G networks are about to deploy it all over the world. This 5G technologies support by connecting the devices with rapid growth in network capacity, high QoS. Apart from this feature, 5G has more advantages in security, decentralization, transparency, data interoperability. The 5G network has millions of IoT devices are connected. With higher speeds these devices are enabled and worked with high speed. Blockchain is an important technology in the current trend. The Blockchain technology is used in more fields such as online payments, healthcare, smart contracts etc. Extending the technology of block chain to Internet of things (IoT) can have more features. The important issues in 5G technology is security because millions of IoT devices are connected and more confidential data is transferred. This data should be more secure using blockchain technology. This proposed system is to secure the data in smart healthcare systems using blockchain in 5G networks to prevent the data from forgery.


INTRODUCTION
In 4G technology, we have very good features in more applications.The few services such as Smart IoT, AI that could not make in the previous generation.We need more data capacity and faster data which is required in few fields such as AI, big data, and smart IoT [1] [2].It has a better connectivity to allow cross platform devices to speak to each other intelligently with data rate, connectionless services.The important three aspects are data transfer rate is faster in peak time, undisturbed connection, bandwidth free and fast data transfer for mobility [ 3]. 5G network has more features such as reliable, faster than 4G network.The data capacity is up to 10Gbps.The CDMA and BDMA are the two types of multiplexing used in 5G technology [4].The frequency is from 3 to 300 Ghz.The handoff supported is horizontal and vertical.The major features of 5G technology is lower battery consumption, lower latency, the applications combined with AI, it supports multimedia capability with AR/VR, more security, high data transfer rates.
Health care is an industrial sector where associations and clinical organizations give medicinal services administrations, medical equipment, medical coverage to encourage social insurance conveyance to patients [5][6].The integration of blockchain with 5G technology can propel current health care system and give more execution benefits as far as better decentralization, security, protection, system simplifications for lower operational expenses.Blockchain can fuse with 5G advances.The softwarized framework can perform arrange works through NFVs, which advance IoT correspondence, while distributed computing can bolster quick social insurance conveyance administrations for early identification of patient wellbeing conditions.In such a 5G medicinal services situation, blockchain is utilized to manufacture a distributed database framework which can approve and record all exchanges (for example social insurance demand, understanding information) and store changelessly them in decentralized records [7].The job of blockchain in this work is to manage wellbeing information interoperability and security issues, for example, empowering powerful approved cooperation among patients and social insurance suppliers (specialists, insurance agencies), and conveying persistent information safely to an assortment of associations and gadgets [8].
Healthcare data should be more secure and should be more privacy.This data should be restricted from modification and destruction of stored data.If unauthorized person accessing the data then the data will be sold or misuse the data.In 5G technology, the size of the healthcare data increases, so the security mechanisms to protect the data should be also compelled [9].

II. RELATED WORK
The 5G technology is more benefits in more applications.One of the important applications is healthcare systems.
The healthcare systems can be remote monitoring the patients.The information about the patients will be send to the care taker without any delay.This 5G technology deliver the information with high speed without reducing latency.This proposed system discusses about how to secure the data which is transform from patient to healthcare providers by using blockchain in 5G technology.
If the data is changed by unauthorized users then the medical suggestion and drugs suggested by doctors will leads to serious consequences, such as cause death, poisioning etc [10].To avoid this issue more security is needed while transmitting and receiving the data.This proposed work focus on how securely data is transmitting and receiving and also it will avoid the man-in-the -middle attack [11].In the existing work, the primary data is generated from the patient and the doctor interaction [12][13].The primary data has medical history, current issues about the patient.EHR has the medicines history, nursing care, reports about the patient.In the customized user access, it gives preference to the owner to access the data.
More algorithms have already proposed for securing the health data using block chain techniques [14][15].A novel approach key management algorithm used to secure the healthcare data.

III. PROPOSED SYSTEM
In 5G technology, millions of IoT devices are connected together and transferring the data to another device.If more data is transferring from one device to other device, it may lead to failure or less secure transmission.To secure this data transmission more security algorithm is proposed.This proposed system discusses about how the data transmission is secured using blockchain in healthcare applications.Healthcare data should be more secure and privacy.Privacy means the person should have the rights to access or disclose personal information.In privacy itself assign who should be allowed to access the data.

System Architecture
In this architecture, the patient is monitored remotely using healthcare IoT devices.These devices sense the patient such as heartbeats, Sleeping conditions, pressure, glucose level etc.These data is monitored by doctor and store in the cloud using blockchain.The data which is received should be verified from the authorized device.
The patient can share his data with other hospitals also.Deployment of Smart Contracts is used to secure the transaction which is stored in the blockchain.In the architecture diagram, the entities used are patient, Cloud, Hospitals, agencies.Each patient is assigned by a patient id and each transaction about the patient is stored in the cloud.With the help of keys, the record can be accessed by the healthcare providers.This proposed system focus on how the data is stored securely and how it is accessed with more secure is shown in Fig. 1.
Fig. 1Proposed architecture The privacy is achieved by storing the records in encrypted format.The Hospitals/Agencies which wish to read the health record should approach the patient with their identity.Patient generates the key using algorithm and securely shares the key with the third party and shares the record.Patient identity is a complex problem within healthcare, as a patient may registered multiple times with different accounts at same or different hospitals.This leads to fragmentation.When the patient is in an unresponsive state, the key escrow technique will be used to solve the problem of accessing the record.
The record storage will be (Patient Id, Record, Record Hash, File Id, Date, Doctor Id, Disease Id, Parent record hash).The record structure of a patient is { patient id,data,hash1,fileid}.The record structure of a hospital/doctor {Hid/Did, key}.The Record transaction(hospital) has {Patient address, Service provider access, Record hash, File identity, Patient consent, Timestamp, Signature}.The key transaction(user/patient) is {Hospital/patient address, Public key, timestamp, signature}

Key Generation
In this proposed technique an ECC algorithm is used to achieve the security in blockchain using two parties P and Q .It has two points A and B.
 The parties contain the key A and B.
 P send a request message to Q. (message has its key A and B)  Q computes the C value   Q send message to P. ( message has id and C value).
 C value is computed as :  P checks the C value.
 If it is equal, then P sent data to the Q.

IV. RESULTS AND DISCUSSION
The proposed system is discussed and the experimental results is evaluated is shown in table.1.Results are shown for performance latency, throughput, communication overhead etc.The two performance metrics are used in this proposed system.The two metrics are communication overhead and computation overhead.

Communication overhead:
Number of messages and the total data need to be exchanged is calculated in communication overhead.
a) Number of exchanged messages: The proposed system is compared with two algorithms RSA and Diffi hellman.The proposed system uses ECC algorithm.The ECC algorithm has less messages are exchanged are shown in Fig. 5.The number of messages exchanged is 6 for one transaction in proposed system.But in RSA and Diffi hellman has more messages are exchanged when compared with ECC algorithms is shown in Fig. 2. The amount of data used in the proposed system has occupies two bytes for identifier, q has 20 bytes, elliptic curve point occupies 20 bytes,for signatures occupies 20 bytes, and timestamp has 5 bytes.The proposed system decreases the no. of messages and the amount of data required to be exchanged is very less when compared with other algorithms is shown in Fig. 3.

V. CONCLUSION
The 5G network has millions of IoT devices are connected.The Blockchain technology is one of the new technology used in more fields such as online payments, healthcare, smart contracts etc. Extending the technology of block chain to Internet of things (IoT) can have more features.The important issues in 5G technology is security.This data should be more secure using blockchain technology.The proposed system is to secure the data in smart healthcare systems using blockchain in 5G networks using the ECC algorithm.The proposed work is compared with the existing algorithms such as RSA and Diffie hellman.The two metrics are used to compare the performance.The proposed method secure more compared with the other algorithms.

Fig. 2
Fig.2 Number of Exchanged Message Schemes

Fig. 3
Fig.3 Amount of Data Transferred