Achieving data privacy for decision support systems in times of massive data sharing

被引:7
作者
Fazal, Rabeeha [1 ]
Shah, Munam Ali [1 ]
Khattak, Hasan Ali [2 ]
Rauf, Hafiz Tayyab [3 ]
Al-Turjman, Fadi [4 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad, Pakistan
[2] Natl Univ Sci & Technol NUST, Sch Elect Engn & Comp Sci SEECS, H12, Islamabad, Pakistan
[3] Univ BRADFORD, Fac Engn & Informat, Dept Comp Sci, Bradford, W Yorkshire, England
[4] Near East Univ, Res Ctr AI & IoT, Artificial Intelligence Dept, Mersin 10, Istanbul, Turkey
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2022年 / 25卷 / 05期
关键词
Data privacy; Encryption; Blowfish; Data masking; Identity data; Sensitive data; Non-sensitive data;
D O I
10.1007/s10586-021-03514-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The world is suffering from a new pandemic of Covid-19 that is affecting human lives. The collection of records for Covid-19 patients is necessary to tackle that situation. The decision support systems (DSS) are used to gather that records. The researchers access the patient's data through DSS and perform predictions on the severity and effect of the Covid-19 disease; in contrast, unauthorized users can also access the data for malicious purposes. For that reason, it is a challenging task to protect Covid-19 patient data. In this paper, we proposed a new technique for protecting Covid-19 patients' data. The proposed model consists of two folds. Firstly, Blowfish encryption uses to encrypt the identity attributes. Secondly, it uses Pseudonymization to mask identity and quasi-attributes, then all the data links with one another, such as the encrypted, masked, sensitive, and non-sensitive attributes. In this way, the data becomes more secure from unauthorized access.
引用
收藏
页码:3037 / 3049
页数:13
相关论文
共 41 条
[1]   Big healthcare data: preserving security and privacy [J].
Abouelmehdi, Karim ;
Beni-Hessane, Abderrahim ;
Khaloufi, Hayat .
JOURNAL OF BIG DATA, 2018, 5 (01)
[2]  
Afzal M, 2018, TENCON IEEE REGION, P2259, DOI 10.1109/TENCON.2018.8650175
[3]  
Aggarwal K., 2013, INT J COMPUT APPL, V68, P10, DOI DOI 10.5120/11749-7244
[4]   FIViz: Forensics Investigation through Visualization for Malware in Internet of Things [J].
Ahmad, Israr ;
Shah, Munam Ali ;
Khattak, Hasan Ali ;
Ameer, Zoobia ;
Khan, Murad ;
Han, Kijun .
SUSTAINABILITY, 2020, 12 (18)
[5]   Healthcare Professional and User Perceptions of eHealth Data and Record Privacy in Dubai [J].
AlMarzooqi, Fatima Mohamed ;
Moonesar, Immanuel Azaad ;
AlQutob, Raeda .
INFORMATION, 2020, 11 (09)
[6]  
[Anonymous], 2010, ARXIV PREPRINT ARXIV
[7]   Fog Based Architecture and Load Balancing Methodology for Health Monitoring Systems [J].
Asghar, Anam ;
Abbas, Assad ;
Khattak, Hasan Ali ;
Khan, Samee U. .
IEEE ACCESS, 2021, 9 :96189-96200
[8]  
Awan K. A., 2021, EdgeTrust-A Lightweight Data-centric Trust Management Approach for Green Internet of Edge Things, DOI DOI 10.21203/RS.3.RS-453986/V1
[9]   Pandemics, privacy, and public health research [J].
Bernier, Alexander ;
Knoppers, Bartha Maria .
CANADIAN JOURNAL OF PUBLIC HEALTH-REVUE CANADIENNE DE SANTE PUBLIQUE, 2020, 111 (04) :454-457
[10]  
Commey D., 2020, Int. J. Comput. Appl., V177, P17