When block-chain technology is used to a database's worth of information, such blocks of information remain secure and aid in guaranteeing privacy while providing maximum transparency [9]. After being encrypted, these records are placed on the cloud, where they can eventually aid in the treatment of patients by allowing doctors to compare current information with past records. Similarly, 5G services can be used to transmit cloud-stored data to medical professionals. The ultimate consumers of healthcare are the doctors and nurses who recommend certain procedures to their patients. Further, the system's primary goal is to offer the fastest possible response to the patient for treatment while maintaining their anonymity and the confidentiality of their information.
This method was created to take full advantage of the numerous advantages of cloud computing. Similarly, nonparametric models can be used in situations where we either lack necessary background knowledge or do not have enough data to make an informed decision. Fog computing is used by similar Internet of Things devices to set limits on inter-device cooperation, allowing for instantaneous data transmission and response [10, 11].
Deep learning, according to [12], was instrumental in the discovery of architectures like the Hierarchical Computing Architecture (HiCH), which, when combined with algorithms like Internet of Things, convolutional neural network (CNN) [13, 14], will lead to the development of wireless body area networks (WBAN) for wearable devices. A variety of machine learning algorithms, including KNN ,EM, C5.0, C4.5 and, are used to enhance AI by filling in missing data and building decision trees. Recently, several meta-algorithms have been developed with the express purpose of enhancing the efficiency of ML programmes. There are a number of access control problems inherent to IoT-Healthcare approaches [15] and a number of algorithms have been developed to solve them.
[16], suggest using smart contracts built on the blockchain to conduct medical sensor research and management in a secure environment. Using the Ethereum protocol and a private blockchain, the author designed a network in which sensors can exchange data with a portable computer that can then invoke smart agreements and monitor all Blockchain activity.
In [17], propose a blockchain-based system for protecting patients' privacy while allowing patients, clinicians and third parties secure, interoperable and effective access to medical data. The system uses smart contracts on an Ethereum-based blockchain to improve access control and code obfuscation, adding a layer of security through cryptographic techniques.
A novel Blockchain-based architecture for storing medical records was presented by [18]. Important data should be kept permanently in case claims of interference arise and its original state needs to be confirmed. To safeguard its users' privacy, the author employs a number of cryptographic strategies in addition to stringent data management procedures.
Recently occurring coronavirus epidemics have wreaked havoc on hospital IT systems, making it harder to maintain and process patient records. These experts believe that the Internet of Things is the best strategy for overcoming the challenges of developing intelligent healthcare systems in the future. The Internet of Things improves data processing, access management, and intelligent identification in healthcare administration by combining artificial intelligence (AI), network technology (networks), and sensor technology (sensing). As a result, we can create a healthcare system that is not only more secure, but also more affordable, user-friendly, and robust. On the other hand, data tampering and leakage are the primary concerns in the field of IoT healthcare [19–21]. Because of this, it's more important than ever to restrict access to patients' medical records. Access restrictions and role-based access control are frequently used in conventional centralised computing settings to address these security concerns.
[22] illustrate that the user attributes and access control policies are converted into vectors of predefined lengths, which simplifies the protocol for accessing the encrypted data. [23] used blockchain technology for user certification and nonrepudiation to facilitate data transmission and access management. There are two problems that may be traced back to these terms, which are unique to the field of access control. (i) How to leverage the user's social data to win their trust and sway without compromising their privacy, and (ii) How to use the user's occupation and trust to construct a failsafe access control system without compromising their privacy (iii) Consequently, the suggested method for the IoT-Healthcare system makes use of a secure access control module that operates in accordance with the user attributes [24].