Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment

被引:0
|
作者
Kuttiyappan, Moorthi [1 ]
Appadurai, Jothi Prabha [2 ]
Kavin, Balasubramanian Prabhu [3 ]
Selvaraj, Jeeva [4 ]
Gan, Hong-Seng [5 ]
Lai, Wen-Cheng [6 ]
机构
[1] Dr NGP Inst Technol, Dept ECE, Coimbatore 641048, Tamil Nadu, India
[2] Kakatiya Inst Technol & Sci, Dept CSE Networks, Warangal 506015, Telangana, India
[3] SRM Inst Sci & Technol, Coll Engn & Technol, Dept Phys & Nanotechnol, Kattankulathur 603203, Tamil Nadu, India
[4] Jain Deemed Be Univ, Dept Informat Sci & Engn, Global Campus, Bangalore 560069, Karnataka, India
[5] Xian Jiaotong Liverpool Univ, XJTLU Entrepreneur Coll Taicang, Sch AI & Adv Comp, Suzhou 215400, Peoples R China
[6] Ming Chi Univ Technol, Dept Elect Engn, New Taipei City 24301, Taiwan
关键词
big data; security; privacy; Boost Graph Convolutional Network Clustering algorithm; magnify pinpointing based encryption approach; Hybrid Particle Swarm; Grey Wolf Optimization; ALGORITHM;
D O I
10.3390/math12131969
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
One of the industries with the fastest rate of growth is healthcare, and this industry's enormous amount of data requires extensive cloud storage. The cloud may offer some protection, but there is no assurance that data owners can rely on it for refuge and privacy amenities. Therefore, it is essential to offer security and privacy protection. However, maintaining privacy and security in an untrusted green cloud environment is difficult, so the data owner should have complete data control. A new work, SecPri-BGMPOP (Security and Privacy of BoostGraph Convolutional Network-Pinpointing-Optimization Performance), is suggested that can offer a solution that involves several different steps in order to handle the numerous problems relating to security and protecting privacy. The Boost Graph Convolutional Network Clustering (BGCNC) algorithm, which reduces computational complexity in terms of time and memory measurements, was first applied to the input dataset to begin the clustering process. Second, it was enlarged by employing a piece of the magnifying bit string to generate a safe key; pinpointing-based encryption avoids amplifying leakage even if a rival or attacker decrypts the key or asymmetric encryption. Finally, to determine the accuracy of the method, an optimal key was created using a meta-heuristic algorithmic framework called Hybrid Fragment Horde Bland Lobo Optimisation (HFHBLO). Our proposed method is currently kept in a cloud environment, allowing analytics users to utilise it without risking their privacy or security.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Big Data Processing Security Issues in Cloud Environment
    Bouleghlimat, Imene
    Hacini, Salima
    ADVANCES IN COMPUTING SYSTEMS AND APPLICATIONS, 2019, 50 : 27 - 36
  • [32] Local Data Security and Privacy Protection in Cloud Service Applications
    Lin, Qi-Tao
    Wang, Chang-Dong
    Pan, Jing
    Ling, Lu
    Lai, Jian-Huang
    2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 253 - 257
  • [33] Dynamic Data Integrity Auditing Method Supporting Privacy Protection in Vehicular Cloud Environment
    Shao, Bilin
    Bian, Genqing
    Wang, Yue
    Su, Shenghao
    Guo, Cheng
    IEEE ACCESS, 2018, 6 : 43785 - 43797
  • [34] A Hybrid Location Privacy Protection Scheme in Big Data Environment
    Nosouhi, Mohammad Reza
    Pham, Vu Viet Hoang
    Yu, Shui
    Xiang, Yong
    Warren, Matthew
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [35] Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing
    B. B. Gupta
    Shingo Yamaguchi
    Dharma P. Agrawal
    Multimedia Tools and Applications, 2018, 77 : 9203 - 9208
  • [36] Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT
    Stergiou, Christos
    Psannis, Kostas E.
    Gupta, Brij B.
    Ishibashi, Yutaka
    SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2018, 19 : 174 - 184
  • [37] Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing
    Gupta, B. B.
    Yamaguchi, Shingo
    Agrawal, Dharma P.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (07) : 9203 - 9208
  • [38] Scheduling workflows with privacy protection constraints for big data applications on cloud
    Wen, Yiping
    Liu, Jianxun
    Dou, Wanchun
    Xu, Xiaolong
    Cao, Buqing
    Chen, Jinjun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 1084 - 1091
  • [39] Cloud workflow scheduling method with data privacy protection
    Wang, Jing
    Han, Yan-Bo
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2013, 19 (08): : 1859 - 1867
  • [40] Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
    Esposito, Christian
    De Santis, Alfredo
    Tortora, Genny
    Chang, Henry
    Choo, Kim-Kwang Raymond
    IEEE CLOUD COMPUTING, 2018, 5 (01): : 31 - 37