Trustworthy Processing of Healthcare Big Data in Hybrid Clouds

被引:92
作者
Nepal, Surya [1 ]
Ranjan, Rajiv [1 ]
Choo, Kim-Kwang Raymond [2 ]
机构
[1] CSIRO, Canberra, ACT, Australia
[2] Univ S Australia, Sch Informat Technol & Math Sci, Adelaide, SA 5001, Australia
来源
IEEE CLOUD COMPUTING | 2015年 / 2卷 / 02期
关键词
big data; big data processing; cloud computing; healthcare; Internet-connected devices; privacy;
D O I
10.1109/MCC.2015.36
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As we delve deeper into the "Digital Age," we're witnessing an explosive growth in the volume, velocity, variety, veracity, and value (the 5Vs) of data produced over the Internet. According to recent Cisco(1) and IBM2 reports, we now generate 2.5 quintillion bytes of data per day, and this is set to explode to 40 yottabyes by 2020(3)-that is, 5,200 gigabytes for every person on the earth. As noted in previous "Blue Skies" columns, data generated by Internet of Things (IoT) devices and sensors are part of the big data landscape. 4,5 IoT comprises billions of Internet-connected devices (ICDs) or "things," each of which can sense, communicate, compute, and potentially actuate, and can have intelligence, multimodal interfaces, physical/virtual identities, and attributes. ICDs can be mobile devices, sensors, medical imaging devices, individual archives, social networks, smart cameras, body sensors, automobile cosimulations, or software logs. In a nutshell, a large volume of veracity data is generated at high velocity from a variety of sources.
引用
收藏
页码:78 / 84
页数:7
相关论文
共 25 条
[1]  
[Anonymous], 2013, n+1, V17
[2]  
[Anonymous], 2012, MED IM CLOUD
[3]   Making Big Data Useful for Health Care: A Summary of the Inaugural MIT Critical Data Conference [J].
Badawi, Omar ;
Brennan, Thomas ;
Celi, Leo Anthony ;
Feng, Mengling ;
Ghassemi, Marzyeh ;
Ippolito, Andrea ;
Johnson, Alistair ;
Mark, Roger G. ;
Mayaud, Louis ;
Moody, George ;
Moses, Christopher ;
Naumann, Tristan ;
Nikore, Vipan ;
Pimentel, Marco ;
Pollard, Tom J. ;
Santos, Mauro ;
Stone, David J. ;
Zimolzak, Andrew .
JMIR MEDICAL INFORMATICS, 2014, 2 (02) :41-51
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[6]  
Borghino D., 2010, GIZMAG 1207
[7]  
Dalyrimple F., 2015, POSTGRES MEETS HIPAA
[8]  
Gantz J., 2012, IDC IVIEW
[9]  
Gentry Craig, 2009, A fully homomorphic encryption scheme
[10]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1