Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment

被引:0
|
作者
Kuttiyappan, Moorthi [1 ]
Appadurai, Jothi Prabha [2 ]
Kavin, Balasubramanian Prabhu [3 ]
Selvaraj, Jeeva [4 ]
Gan, Hong-Seng [5 ]
Lai, Wen-Cheng [6 ]
机构
[1] Dr NGP Inst Technol, Dept ECE, Coimbatore 641048, Tamil Nadu, India
[2] Kakatiya Inst Technol & Sci, Dept CSE Networks, Warangal 506015, Telangana, India
[3] SRM Inst Sci & Technol, Coll Engn & Technol, Dept Phys & Nanotechnol, Kattankulathur 603203, Tamil Nadu, India
[4] Jain Deemed Be Univ, Dept Informat Sci & Engn, Global Campus, Bangalore 560069, Karnataka, India
[5] Xian Jiaotong Liverpool Univ, XJTLU Entrepreneur Coll Taicang, Sch AI & Adv Comp, Suzhou 215400, Peoples R China
[6] Ming Chi Univ Technol, Dept Elect Engn, New Taipei City 24301, Taiwan
关键词
big data; security; privacy; Boost Graph Convolutional Network Clustering algorithm; magnify pinpointing based encryption approach; Hybrid Particle Swarm; Grey Wolf Optimization; ALGORITHM;
D O I
10.3390/math12131969
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
One of the industries with the fastest rate of growth is healthcare, and this industry's enormous amount of data requires extensive cloud storage. The cloud may offer some protection, but there is no assurance that data owners can rely on it for refuge and privacy amenities. Therefore, it is essential to offer security and privacy protection. However, maintaining privacy and security in an untrusted green cloud environment is difficult, so the data owner should have complete data control. A new work, SecPri-BGMPOP (Security and Privacy of BoostGraph Convolutional Network-Pinpointing-Optimization Performance), is suggested that can offer a solution that involves several different steps in order to handle the numerous problems relating to security and protecting privacy. The Boost Graph Convolutional Network Clustering (BGCNC) algorithm, which reduces computational complexity in terms of time and memory measurements, was first applied to the input dataset to begin the clustering process. Second, it was enlarged by employing a piece of the magnifying bit string to generate a safe key; pinpointing-based encryption avoids amplifying leakage even if a rival or attacker decrypts the key or asymmetric encryption. Finally, to determine the accuracy of the method, an optimal key was created using a meta-heuristic algorithmic framework called Hybrid Fragment Horde Bland Lobo Optimisation (HFHBLO). Our proposed method is currently kept in a cloud environment, allowing analytics users to utilise it without risking their privacy or security.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Based on the Technological Analysis of Big Data Security and Privacy Protection Technology
    Wang, Lei
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY (EMCS 2017), 2017, 61 : 603 - 606
  • [42] Network Information Security Privacy Protection System in Big Data Era
    Ma, Lei
    Kang, Ying-jian
    Liu, Jian-ping
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT I, 2019, 301 : 65 - 73
  • [43] Research on the Model of Big Data Serve Security in Cloud Environment
    Cui, Hai-ting
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 514 - 517
  • [44] Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
    Sun, Pan Jun
    IEEE ACCESS, 2019, 7 : 147420 - 147452
  • [45] An Optimized Integrated Framework of Big Data Analytics Managing Security and Privacy in Healthcare Data
    Chauhan, Ritu
    Kaur, Harleen
    Chang, Victor
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (01) : 87 - 108
  • [46] An Optimized Integrated Framework of Big Data Analytics Managing Security and Privacy in Healthcare Data
    Ritu Chauhan
    Harleen Kaur
    Victor Chang
    Wireless Personal Communications, 2021, 117 : 87 - 108
  • [47] Data Security and Privacy Management in Healthcare Applications and Clinical Data Warehouse Environment
    Puppala, Mamta
    He, Tiancheng
    Yu, Xiaohui
    Chen, Shenyi
    Ogunti, Richard
    Wong, Stephen T. C.
    2016 3RD IEEE EMBS INTERNATIONAL CONFERENCE ON BIOMEDICAL AND HEALTH INFORMATICS, 2016, : 5 - 8
  • [48] Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection
    Jia, Rui
    Ni, Xiaoli
    Shao, Xiaoyi
    Zhang, Ting
    Qi, Qunkun
    WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [49] DATA LOSS PROTECTION AND DATA SECURITY USING AGENTS FOR CLOUD ENVIRONMENT
    Carolin, S. Petcy
    Somasundaram, M.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [50] Cybersecurity of Medical Data Based on Big Data and Privacy Protection Method
    Li, Jianhong
    Pan, An
    Zheng, Tongxing
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2023, 19 (05)