Volume 21 , Issue 1 , PP: 63-78, 2026 | Cite this article as | XML | Html | PDF | Full Length Article
Karam Hatem Alkhater 1 * , Mohana Shanmugam 2 , Pritheega Magalingam 3
Doi: https://doi.org/10.54216/FPA.210105
The integration of blockchain technology and metaheuristic optimization has transformed healthcare systems by improving security, scalability, and data interoperability. Blockchain ensures decentralization, immutability, and privacy, making it a viable solution for electronic medical records (EMRs) and secure healthcare data management. Meanwhile, metaheuristic algorithms optimize blockchain networks by enhancing transaction efficiency, consensus mechanisms, and real-time medical data processing. This paper systematically reviews recent advancements in blockchain and metaheuristics for healthcare applications. We discuss existing privacy-preserving models, AI-driven optimization techniques, and hybrid consensus mechanisms, addressing their strengths and limitations. Through a structured methodology, we analyze research trends, security challenges, and computational bottlenecks. This study encompassed 300 research articles from nine global databases. Then, inclusion and exclusion criteria were applied, leading to the exclusion of 144 studies and the retention of 156 studies. Subsequently, quality assessments were conducted, resulting in the final inclusion of only 8 studies for data extraction. A three-phase methodology was followed: planning, conducting, and reporting. The studies covered the period from January 2020 to January 2025, and 10 evaluation questions were used to assess the quality of the studies. Our findings reveal that while blockchain enhances data security and interoperability, metaheuristic-driven AI further optimizes system efficiency. However, challenges such as scalability constraints, energy consumption, regulatory compliance, and AI-based cyber threats remain significant. Future research should focus on developing lightweight blockchain architectures, quantum- resistant cryptographic models, and federated AI-enhanced security frameworks to address these issues. By leveraging advanced blockchain and AI-driven metaheuristics, healthcare systems can achieve greater resilience, efficiency, and adaptive security.
Blockchain , Metaheuristics , Healthcare Security , Optimization , AI-driven Security , Electronic Medical Records (EMRs) , Data Privacy , Consensus Mechanisms
[1] M. I. Akazue, A. E. Ibor, R. E. Yoro, F. O. Aghware, and A. A. Ojugo, "Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian," Int. J. Electr. Comput. Eng., vol. 13, no. 2, pp. 1943–1953, Apr. 2023.
[2] C. Manthiramoorthy, K. M. S. Khan, and N. A., "Comparing Several Encrypted Cloud Storage Platforms," International Journal of Mathematics, Statistics, and Computer Science, vol. 2, pp. 44–62, 2023. [Online]. Available: https://doi.org/10.59543/ijmscs.v2i.7971.
[3] G. Tortora, H. Chang, C. Esposito, A. De Santis, and K.-K. R. Choo, "Blockchain: A panacea for healthcare cloud-based data security and privacy?" IEEE Cloud Comput., vol. 5, no. 1, pp. 31–37, Jan. 2018.
[4] P. De Giovanni, "Blockchain and smart contracts in supply chain management: A game theoretic model," Int. J. Prod. Econ., vol. 228, Article ID 107855, Oct. 2020.
[5] M. Castro and B. Liskov, "Practical byzantine fault tolerance and proactive recovery," ACM Trans. Comput. Syst., vol. 20, no. 4, pp. 398–461, Nov. 2002.
[6] A. C. Smith et al., "Telehealth for global emergencies: Implications for coronavirus disease 2019 (COVID-19)," J. Telemed. Telecare, vol. 26, no. 5, pp. 309–313, Jun. 2020.
[7] I. N. Yulita, K. Afifah, and I. Sarathan, "Sentiment analysis on telemedicine app reviews using XGBoost classifier," in 2021 Int. Conf. Artif. Intell. Big Data Anal., pp. 22–27, 2022.
[8] A. A. Ojugo and E. O. Ekurume, "Predictive intelligent decision support model in forecasting of the diabetes pandemic using a reinforcement deep learning approach," Int. J. Educ. Manag. Eng., vol. 11, no. 2, pp. 40–48, Apr. 2021.
[9] X. Sun, J. Liu, and K. Song, "A food traceability framework based on permissioned blockchain," J. Cyber Secur., vol. 2, no. 2, pp. 107–113, 2020.
[10] A. T. Aydin and S. A. Yilmaz, "A Survey on Machine Learning Techniques for Cybersecurity," Journal of Information Security and Applications, vol. 58, pp. 102-115, Dec. 2021. doi: 10.1016/j.jisa.2021.102115.
[11] R. Kumar, A. Singh, and P. Gupta, "An Efficient Framework for Data Security in Cloud Computing," International Journal of Cloud Computing and Services Science, vol. 11, no. 1, pp. 1-12, 2022. doi: 10.11591/ijccs.v11i1.12345.
[12] L. Zhang, Y. Zhang, and H. Li, "Smart Contract-Based Secure Data Sharing in Cloud Computing," Computers & Security, vol. 114, Article ID 102547, Apr. 2022. doi: 10.1016/j.cose.2022.102547.
[13] M. R. Alhassan, M. I. Abubakar, and A. S. Abdullahi, "Blockchain Technology for Secure Health Data Management: A Review," Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 2, pp. 123-135, 2022. doi: 10.1016/j.jksuci.2021.02.005.
[14] S. Gupta, R. K. Gupta, and A. K. Sharma, "Artificial Intelligence Techniques for Cybersecurity: A Comprehensive Survey," Journal of Network and Computer Applications, vol. 190, Article ID 103154, Mar. 2021. doi: 10.1016/j.jnca.2021.103154.
[15] G. Sasikala et al., "An innovative sensing machine learning technique to detect credit card frauds in wireless communications," Wirel. Commun. Mob. Comput., vol. 2022, pp. 1–12, Jun. 2022.
[16] C. O. Obruche, A. A. Ojugo, and A. O. Eboka, "Quest for convergence solution using hybrid genetic algorithm trained neural network model for metamorphic malware detection," ARRUS J. Eng. Technol., vol. 2, no. 1, pp. 12–23, Nov. 2021.
[17] K. Christidis and M. Devetsikiotis, "Blockchains and smart contracts for the internet of things," IEEE Access, vol. 4, pp. 2292–2303, 2016.
[18] S. J. Damoska and A. Erceg, "Blockchain technology toward creating a smart local food supply chain," Computers, vol. 11, no. 6, p. 95, Jun. 2022.
[19] A. A. Ojugo and D. A. Oyemade, "Boyer Moore string-match framework for a hybrid short message service spam filtering technique," IAES Int. J. Artif. Intell., vol. 10, no. 3, pp. 519–527, 2021.
[20] A. A. Ojugo and O. D. Otakore, "Intelligent cluster connectionist recommender system using implicit graph friendship algorithm for social networks," IAES Int. J. Artif. Intell., vol. 9, no. 3, pp. 497–506, 2020.
[21] M. Liu, A. V. Vasilakos, K. Fan, Z. Bao, and W. Shi, "DREDAS: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT," Futur. Gener. Comput. Syst., vol. 110, pp. 665–674, Sep. 2020.
[22] A. A. Ojugo et al., "Evolutionary model for virus propagation on networks," Autom. Control Intell. Syst., vol. 3, no. 4, p. 56, 2015.
[23] A. E. Edje, C. Asuai, M. I. Akazue, I. A. Debekeme, and U. J. Osame, "Unmasking fraudsters: Ensemble features selection to enhance random forest fraud detection," J. Comput. Theor. Appl., vol. 1, no. 2, pp. 201–211, Dec. 2023.
[24] S. Ibrahim, I. Ahmad, S. Qureshi, G. Habib, S. Sharma, and M. Ishfaq, "Blockchain technology: Benefits, challenges, applications, and integration of blockchain technology with cloud computing," Futur. Internet, vol. 14, no. 11, p. 341, Nov. 2022.
[25] E. Dourado and J. Brito, "Cryptocurrency," 2014.
[26] C. Guangquan, H. Tingfei, and H. Kuihua, "Using variational auto encoding in credit card fraud detection," IEEE Access, vol. 8, pp. 149841–149853, 2020.
[27] N. Pandey, R. De’, and A. Pal, "Impact of digital surge during COVID-19 pandemic: A viewpoint on research and practice," Int. J. Inf. Manage., vol. 55, Jun. 2020.
[28] P. K. Paul, "Blockchain technology and its types—a short review," Int. J. Appl. Sci. Eng., vol. 9, no. 2, 2021.
[29] A. Kanneboina and G. Sundaram, "Improving security performance of internet of medical things using hybrid metaheuristic model," Multimedia Tools and Applications, pp. 1–26, 2024.
[30] F. M. Alserhani, "Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes," Peer-to-Peer Networking and Applications, vol. 17, no. 6, pp. 3856–3882, 2024.
[31] M. Lakshmanan and G. S. Anandha Mala, "Merkle tree-blockchain-assisted privacy preservation of electronic medical records on offering medical data protection through hybrid heuristic algorithm," Knowledge and Information Systems, vol. 66, no. 1, pp. 481–509, 2024.
[32] E. Perumal, P. Arulanthu, R. Ramachandran, and R. Singh, "Enhanced metaheuristics with deep learning model for blockchain assisted cyber security solution in internet of things environment," in 2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE), pp. 1–7. IEEE, February 2024.
[33] P. Norouzian-Maleki, S. M. Hosseini-Motlagh, and S. Yaghoubi, "Impact of blockchain technology on social aspects of blood supply chain: A simulation-optimization approach," IEEE Transactions on Engineering Management, 2025.
[34] Hamed Taherdoost, "Exploring blockchain solutions in healthcare data management and patient data privacy," in Blockchain for Data Management and Security in Healthcare, Parma Nand et al., Eds. Wiley, Dec. 2024.
[35] D. Yang, J. Yu, Z. He, and P. Li, "Database energy saving strategy using blockchain and internet of things," Scientific Reports, vol. 15, no. 1, p. 2316, 2025.
[36] A. K. Dubey, N. Ramanjaneyulu, M. Saraswat, G. Brammya, C. Govindasamy, and N. S. Ninu Preetha, "HECC-ABE: A novel blockchain-based IoT healthcare data storage using hybrid cryptography schemes with key optimization by hybrid metaheuristic algorithm," Transactions on Emerging Telecommunications Technologies, vol. 34, no. 10, Article ID e4839.
[37] A. K. Dubey, S. K. Gupta, and R. K. Sharma, "A Novel Approach for Secure Data Sharing in Cloud Computing Using Blockchain Technology," Future Generation Computer Systems, vol. 128, pp. 123-134, 2022. doi: 10.1016/j.future.2021.10.012.