Authors :
Anbarasi M. S.; Imayavaramban P.; Saranya S.; Saran V.
Volume/Issue :
Volume 11 - 2026, Issue 4 - April
Google Scholar :
https://tinyurl.com/34n29z2j
Scribd :
https://tinyurl.com/29jnud65
DOI :
https://doi.org/10.38124/ijisrt/26apr1595
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
In the current scenario after pandemic, remote health monitoring systems play a vital role for real-time patient healthcare. Sensitive data such as patient personal information and medical records are transmitted between patients, hospital databases, and healthcare specialists, often via Virtual Private Networks (VPNs). However, VPNs are susceptible to malware and phishing attacks, and traditional perimeter-based security models fail to provide adequate protection against insider threats and lateral movement within networks. This project proposes Zero Trust-Based Secure Healthcare Data Access System with LSTM Behavioral Analysis, a layered security that integrates Zero Trust Network Access, continuous identity verification, machine learning-driven behavioral anomaly detection, and automated incident response. The system enforces identity-certificate-based network isolation, per-request authentication, and attribute-based policy control to ensure no device or user gains access without continuous verification. User sessions are monitored in real time using a Long Short-Term Memory model that analyses sequential behavioral patterns and computes dynamic trust scores, enabling detection of insider threats that bypass traditional access control. Based on these scores, the system automatically applies graduated containment actions from enhanced monitoring to complete session revocation, eliminating the delay between detection and active response. By unifying network-level isolation, behavioral intelligence, and automated enforcement, the proposed system bridges the gap between static access control and the adaptive security demanded by modern healthcare environments.
Keywords :
Zero Trust Architecture, Long Short-Term Memory, Behavioral Anomaly Detection, Healthcare Data Security, Electronic Health Records, Insider Threat Detection, Mutual TLS, Open Policy Agent, Automated Incident Response.
References :
- A. Al-Shaer, J. Al-Haj, and F. Binsaeed, “Zero Trust Architecture for healthcare: A comprehensive review and implementation framework,” in Proc. IEEE Int. Conf. Cyber Security and Cloud Computing (CSCloud), Shenzhen, China, 2024, pp. 112–119.
- I. Chaturvedi, P. M. Pawar, R. Muthalagu, and P. S. Tamizharasan, “Zero Trust Security Architecture for digital privacy in healthcare,” in Information Technology Security, Singapore: Springer, 2024, pp. 1–22.
- L. Chen, Y. Zhang, and H. Wang, “ML-Enhanced Automated Incident Response Framework for Healthcare Cyber Threats,” Journal of Cybersecurity and Privacy, vol. 4, no. 2, pp. 287–305, 2024.
- D. S. Gupta, N. Mazumdar, A. Nag, and J. P. Singh, “Secure data authentication and access control protocol for industrial healthcare systems,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 5, pp. 4853–4864, 2023.
- F. Khanizadeh, A. Ettefaghian, G. Wilson, A. Shirazibeheshti, T. Radwan, and C. Luca, “RTAD-HIS: Regulated transformer architecture based anomaly detection framework towards security in healthcare IoT systems,” Applied Soft Computing, vol. 170, Art. no. 112565, 2025.
- R. Kumar, A. Sharma, and P. Singh, “LSTM-based anomaly detection for EHR access control in telemedicine environments,” in Proc. International Conference on Artificial Intelligence in Healthcare (ICAIH), New Delhi, India, 2024, pp. 45–52.
- Y. Liu, X. Dong, J. Li, and X. Zhang, “A survey on insider threat detection using machine learning and deep learning,” IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 3, pp. 1523–1540, 2024.
- E. M. Paul, U. Mmaduekwe, J. D. Kessie, and M. D. Salawudeen, “Zero trust architecture and AI: A synergistic approach to next-generation cybersecurity frameworks,” International Journal of Science and Research Archive, vol. 13, no. 2, pp. 1–12, 2024.
- S. K. B. Sangeetha, C. Selvarathi, S. K. Mathivanan, J. Cho, and S. V. Easwaramoorthy, “Secure Healthcare Access Control System (SHACS) for anomaly detection and enhanced security in cloud-based healthcare applications,” IEEE Access, vol. 12, pp. 164543–164559, 2024.
- R. K. Sharma, P. Kumar, and S. Mishra, “Implementing Zero Trust Security Model in Healthcare Cloud Environments: Challenges and Solutions,” IEEE Access, vol. 12, pp. 45123–45138, 2024.
- T. Shu, X. Zhao, H. Pei, L. Zhang, and D. Zou, “Insider threat detection based on user behaviour analysis in healthcare information systems,” Future Generation Computer Systems, vol. 148, pp. 234–247, 2023.
- R. Wang, C. Li, K. Zhang, and B. Tu, “Zero-trust based dynamic access control for cloud computing,” Cybersecurity, vol. 8, no. 1, Art. no. 7, 2025.
In the current scenario after pandemic, remote health monitoring systems play a vital role for real-time patient healthcare. Sensitive data such as patient personal information and medical records are transmitted between patients, hospital databases, and healthcare specialists, often via Virtual Private Networks (VPNs). However, VPNs are susceptible to malware and phishing attacks, and traditional perimeter-based security models fail to provide adequate protection against insider threats and lateral movement within networks. This project proposes Zero Trust-Based Secure Healthcare Data Access System with LSTM Behavioral Analysis, a layered security that integrates Zero Trust Network Access, continuous identity verification, machine learning-driven behavioral anomaly detection, and automated incident response. The system enforces identity-certificate-based network isolation, per-request authentication, and attribute-based policy control to ensure no device or user gains access without continuous verification. User sessions are monitored in real time using a Long Short-Term Memory model that analyses sequential behavioral patterns and computes dynamic trust scores, enabling detection of insider threats that bypass traditional access control. Based on these scores, the system automatically applies graduated containment actions from enhanced monitoring to complete session revocation, eliminating the delay between detection and active response. By unifying network-level isolation, behavioral intelligence, and automated enforcement, the proposed system bridges the gap between static access control and the adaptive security demanded by modern healthcare environments.
Keywords :
Zero Trust Architecture, Long Short-Term Memory, Behavioral Anomaly Detection, Healthcare Data Security, Electronic Health Records, Insider Threat Detection, Mutual TLS, Open Policy Agent, Automated Incident Response.