Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment

被引:0
|
作者
Kuttiyappan, Moorthi [1 ]
Appadurai, Jothi Prabha [2 ]
Kavin, Balasubramanian Prabhu [3 ]
Selvaraj, Jeeva [4 ]
Gan, Hong-Seng [5 ]
Lai, Wen-Cheng [6 ]
机构
[1] Dr NGP Inst Technol, Dept ECE, Coimbatore 641048, Tamil Nadu, India
[2] Kakatiya Inst Technol & Sci, Dept CSE Networks, Warangal 506015, Telangana, India
[3] SRM Inst Sci & Technol, Coll Engn & Technol, Dept Phys & Nanotechnol, Kattankulathur 603203, Tamil Nadu, India
[4] Jain Deemed Be Univ, Dept Informat Sci & Engn, Global Campus, Bangalore 560069, Karnataka, India
[5] Xian Jiaotong Liverpool Univ, XJTLU Entrepreneur Coll Taicang, Sch AI & Adv Comp, Suzhou 215400, Peoples R China
[6] Ming Chi Univ Technol, Dept Elect Engn, New Taipei City 24301, Taiwan
关键词
big data; security; privacy; Boost Graph Convolutional Network Clustering algorithm; magnify pinpointing based encryption approach; Hybrid Particle Swarm; Grey Wolf Optimization; ALGORITHM;
D O I
10.3390/math12131969
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
One of the industries with the fastest rate of growth is healthcare, and this industry's enormous amount of data requires extensive cloud storage. The cloud may offer some protection, but there is no assurance that data owners can rely on it for refuge and privacy amenities. Therefore, it is essential to offer security and privacy protection. However, maintaining privacy and security in an untrusted green cloud environment is difficult, so the data owner should have complete data control. A new work, SecPri-BGMPOP (Security and Privacy of BoostGraph Convolutional Network-Pinpointing-Optimization Performance), is suggested that can offer a solution that involves several different steps in order to handle the numerous problems relating to security and protecting privacy. The Boost Graph Convolutional Network Clustering (BGCNC) algorithm, which reduces computational complexity in terms of time and memory measurements, was first applied to the input dataset to begin the clustering process. Second, it was enlarged by employing a piece of the magnifying bit string to generate a safe key; pinpointing-based encryption avoids amplifying leakage even if a rival or attacker decrypts the key or asymmetric encryption. Finally, to determine the accuracy of the method, an optimal key was created using a meta-heuristic algorithmic framework called Hybrid Fragment Horde Bland Lobo Optimisation (HFHBLO). Our proposed method is currently kept in a cloud environment, allowing analytics users to utilise it without risking their privacy or security.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud
    Gupta, Rishabh
    Gupta, Ishu
    Singh, Ashutosh Kumar
    Saxena, Deepika
    Lee, Chung-Nan
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2445 - 2454
  • [22] Marketing data security and privacy protection based on federated gamma in cloud computing environment
    Zhang C.
    Pan Z.
    Hou C.
    International Journal of Intelligent Networks, 2023, 4 : 261 - 271
  • [23] A Survey of Data Security and Privacy Protection in Cloud Computing
    Yuan, Zhongbing
    Liu, Xiaojun
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 647 - 651
  • [24] Data Security and Privacy Protection for Cloud Storage: A Survey
    Yang, Pan
    Xiong, Naixue
    Ren, Jingli
    IEEE ACCESS, 2020, 8 : 131723 - 131740
  • [25] Big Data Services Security and Security Challenges in Cloud Environment
    Alsufyani, Raed
    Jama, Khursand
    Yao, Yulin
    Ramachandran, Muthu
    Chang, Victor
    IOTBD: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND BIG DATA, 2016, : 461 - 468
  • [26] Risk Assessment for Big Data in Cloud: Security, Privacy and Trust
    Ali, Hazirah Bee Bt Yusof
    Abdullah, Lili Marziana Bt
    Kartiwi, Mira
    Nordin, Azlin
    PROCEEDINGS OF 2018 ARTIFICIAL INTELLIGENCE AND CLOUD COMPUTING CONFERENCE (AICCC 2018), 2018, : 63 - 67
  • [27] Security and Privacy of Big Data for Social Networking Services in Cloud
    Stergiou, Christos
    Psannis, Kostas E.
    Xifilidis, Theofanis
    Plageras, Andreas P.
    Gupta, Brij B.
    IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 438 - 443
  • [28] Research on information security and privacy protection model based on consumer behavior in big data environment
    Li, Yuxue
    Song, Lijun
    Zeng, Yucheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (10):
  • [29] A Cloud Based Environment for Big Data Analytics in Healthcare
    Chauhan, Ritu
    Jangade, Rajesh
    Mudunuru, Vimal K.
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 315 - 321
  • [30] Security and Privacy Protection of Social Networks in Big Data Era
    Li, Lixiang
    Ota, Kaoru
    Zhang, Zonghua
    Liu, Yuhong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018