Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment

被引:0
|
作者
Kuttiyappan, Moorthi [1 ]
Appadurai, Jothi Prabha [2 ]
Kavin, Balasubramanian Prabhu [3 ]
Selvaraj, Jeeva [4 ]
Gan, Hong-Seng [5 ]
Lai, Wen-Cheng [6 ]
机构
[1] Dr NGP Inst Technol, Dept ECE, Coimbatore 641048, Tamil Nadu, India
[2] Kakatiya Inst Technol & Sci, Dept CSE Networks, Warangal 506015, Telangana, India
[3] SRM Inst Sci & Technol, Coll Engn & Technol, Dept Phys & Nanotechnol, Kattankulathur 603203, Tamil Nadu, India
[4] Jain Deemed Be Univ, Dept Informat Sci & Engn, Global Campus, Bangalore 560069, Karnataka, India
[5] Xian Jiaotong Liverpool Univ, XJTLU Entrepreneur Coll Taicang, Sch AI & Adv Comp, Suzhou 215400, Peoples R China
[6] Ming Chi Univ Technol, Dept Elect Engn, New Taipei City 24301, Taiwan
关键词
big data; security; privacy; Boost Graph Convolutional Network Clustering algorithm; magnify pinpointing based encryption approach; Hybrid Particle Swarm; Grey Wolf Optimization; ALGORITHM;
D O I
10.3390/math12131969
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
One of the industries with the fastest rate of growth is healthcare, and this industry's enormous amount of data requires extensive cloud storage. The cloud may offer some protection, but there is no assurance that data owners can rely on it for refuge and privacy amenities. Therefore, it is essential to offer security and privacy protection. However, maintaining privacy and security in an untrusted green cloud environment is difficult, so the data owner should have complete data control. A new work, SecPri-BGMPOP (Security and Privacy of BoostGraph Convolutional Network-Pinpointing-Optimization Performance), is suggested that can offer a solution that involves several different steps in order to handle the numerous problems relating to security and protecting privacy. The Boost Graph Convolutional Network Clustering (BGCNC) algorithm, which reduces computational complexity in terms of time and memory measurements, was first applied to the input dataset to begin the clustering process. Second, it was enlarged by employing a piece of the magnifying bit string to generate a safe key; pinpointing-based encryption avoids amplifying leakage even if a rival or attacker decrypts the key or asymmetric encryption. Finally, to determine the accuracy of the method, an optimal key was created using a meta-heuristic algorithmic framework called Hybrid Fragment Horde Bland Lobo Optimisation (HFHBLO). Our proposed method is currently kept in a cloud environment, allowing analytics users to utilise it without risking their privacy or security.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Research on Security and Privacy of Big Data under Cloud Computing Environment
    Zhang Maohong
    Yang Aihua
    Liu Hui
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON BIG DATA RESEARCH (ICBDR 2018), 2018, : 52 - 55
  • [2] Security and Privacy Risk Assessment of Energy Big Data in Cloud Environment
    Li Z.
    Xu W.
    Shi H.
    Zhang Y.
    Yan Y.
    Computational Intelligence and Neuroscience, 2021, 2021
  • [3] Big Data Security and Privacy Protection
    Zhang, Dongpo
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT AND COMPUTER SCIENCE (ICMCS 2018), 2018, 77 : 275 - 278
  • [4] Big data security and privacy protection
    Feng, Deng-Guo
    Zhang, Min
    Li, Hao
    Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (01): : 246 - 258
  • [5] Privacy Protection Method in the Era of Cloud Computing and Big Data
    Liu, Ying
    INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND APPLICATION (ICETA 2015), 2015, 22
  • [6] Research on Enterprise Information Security and Privacy Protection in Big Data Environment
    Du, Juan
    2021 3RD INTERNATIONAL CONFERENCE ON MACHINE LEARNING, BIG DATA AND BUSINESS INTELLIGENCE (MLBDBI 2021), 2021, : 324 - 327
  • [7] Big healthcare data: preserving security and privacy
    Abouelmehdi, Karim
    Beni-Hessane, Abderrahim
    Khaloufi, Hayat
    JOURNAL OF BIG DATA, 2018, 5 (01)
  • [8] Protection of Privacy Data in a Cloud Environment
    Chen, Jeang-Kuo
    Chang, Fang-Sheng
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 964 - 971
  • [9] Big data security and privacy in healthcare: A Review
    Abouelmehdi, Karim
    Beni-Hssane, Abderrahim
    Khaloufi, Hayat
    Saadi, Mostafa
    8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 : 73 - 80
  • [10] Big Data Security in Cloud Environment
    Reddy, Yenumula B.
    2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 100 - 106