Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment

被引:0
|
作者
Kuttiyappan, Moorthi [1 ]
Appadurai, Jothi Prabha [2 ]
Kavin, Balasubramanian Prabhu [3 ]
Selvaraj, Jeeva [4 ]
Gan, Hong-Seng [5 ]
Lai, Wen-Cheng [6 ]
机构
[1] Dr NGP Inst Technol, Dept ECE, Coimbatore 641048, Tamil Nadu, India
[2] Kakatiya Inst Technol & Sci, Dept CSE Networks, Warangal 506015, Telangana, India
[3] SRM Inst Sci & Technol, Coll Engn & Technol, Dept Phys & Nanotechnol, Kattankulathur 603203, Tamil Nadu, India
[4] Jain Deemed Be Univ, Dept Informat Sci & Engn, Global Campus, Bangalore 560069, Karnataka, India
[5] Xian Jiaotong Liverpool Univ, XJTLU Entrepreneur Coll Taicang, Sch AI & Adv Comp, Suzhou 215400, Peoples R China
[6] Ming Chi Univ Technol, Dept Elect Engn, New Taipei City 24301, Taiwan
关键词
big data; security; privacy; Boost Graph Convolutional Network Clustering algorithm; magnify pinpointing based encryption approach; Hybrid Particle Swarm; Grey Wolf Optimization; ALGORITHM;
D O I
10.3390/math12131969
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
One of the industries with the fastest rate of growth is healthcare, and this industry's enormous amount of data requires extensive cloud storage. The cloud may offer some protection, but there is no assurance that data owners can rely on it for refuge and privacy amenities. Therefore, it is essential to offer security and privacy protection. However, maintaining privacy and security in an untrusted green cloud environment is difficult, so the data owner should have complete data control. A new work, SecPri-BGMPOP (Security and Privacy of BoostGraph Convolutional Network-Pinpointing-Optimization Performance), is suggested that can offer a solution that involves several different steps in order to handle the numerous problems relating to security and protecting privacy. The Boost Graph Convolutional Network Clustering (BGCNC) algorithm, which reduces computational complexity in terms of time and memory measurements, was first applied to the input dataset to begin the clustering process. Second, it was enlarged by employing a piece of the magnifying bit string to generate a safe key; pinpointing-based encryption avoids amplifying leakage even if a rival or attacker decrypts the key or asymmetric encryption. Finally, to determine the accuracy of the method, an optimal key was created using a meta-heuristic algorithmic framework called Hybrid Fragment Horde Bland Lobo Optimisation (HFHBLO). Our proposed method is currently kept in a cloud environment, allowing analytics users to utilise it without risking their privacy or security.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Research on Data Security Protection Method Based on Big Data Technology
    Liu, Donglan
    Wang, Rui
    Zhang, Hao
    Ma, Lei
    Liu, Xin
    Huang, Hua
    Chang, Yingxian
    2020 12TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2020), 2020, : 79 - 83
  • [42] PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment
    Imene Bouleghlimat
    Souheila Boudouda
    Salima Hacini
    Arabian Journal for Science and Engineering, 2024, 49 : 3225 - 3239
  • [43] PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment
    Bouleghlimat, Imene
    Boudouda, Souheila
    Hacini, Salima
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 3225 - 3239
  • [44] A PRIVACY-PRESERVING STORAGE SECURITY FOR SPATIAL DATA IN DYNAMICS CLOUD ENVIRONMENT
    Sakthivel, S.
    Dhiyanesh, B.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [45] SecPPAccess: secured privacy protection access control on big data in cloud computing paradigm
    Gupta, Lalit Mohan
    Garg, Hitendra
    Samad, Abdus
    Singh, Atul Kumar
    KNOWLEDGE AND INFORMATION SYSTEMS, 2025,
  • [46] Security and Privacy System Requirements for Adopting Cloud Computing in Healthcare Data Sharing Scenarios Research-in-Progress
    Ermakova, Tatiana
    Fabian, Benjamin
    Zarnekow, Rudiger
    AMCIS 2013 PROCEEDINGS, 2013,
  • [47] Privacy-Protection Path Finding Supporting the Ranked Order on Encrypted Graph in Big Data Environment
    Wu, Bin
    Chen, Xianyi
    Zhang, Caicai
    Mei, Zhuolin
    Zhao, Zhiqiang
    Wu, Zongda
    Yan, Tao
    IEEE ACCESS, 2020, 8 : 214596 - 214604
  • [48] Privacy Preserving Over Big Data Through VSSFA and MapReduce Framework in Cloud Environment
    V. S. Thiyagarajan
    A. Ayyasamy
    Wireless Personal Communications, 2017, 97 : 6239 - 6263
  • [49] Effective convolution method for privacy preserving in cloud over big data using map reduce framework
    Sudhakar, Katherapaka
    Farquad, M. A. H.
    Narshimha, G.
    IET SOFTWARE, 2019, 13 (03) : 187 - 194
  • [50] Analysis of Big Data Cloud Computing Environment on Healthcare Organizations by implementing Hadoop Clusters
    Kaur, Maninder Jeet
    Mishra, Ved P.
    2018 FIFTH HCT INFORMATION TECHNOLOGY TRENDS (ITT): EMERGING TECHNOLOGIES FOR ARTIFICIAL INTELLIGENCE, 2018, : 87 - 90