A bio-inspired privacy-preserving framework for healthcare systems

被引:26
作者
Dhasarathan, Chandramohan [1 ]
Kumar, Manish [2 ]
Srivastava, Atul Kumar [3 ]
Al-Turjman, Fadi [4 ]
Shankar, Achyut [5 ]
Kumar, Manoj [6 ]
机构
[1] Madanapalle Inst Technol & Sci, Dept Comp Sci & Engn, Madanapalle, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai, Tamil Nadu, India
[3] Amity Univ, Dept IT & Engn, Tashkent, India
[4] Near East Univ, Dept Artificial Intelligence Engn, Res Ctr AI & IoT, Mersin 10, Nicosia, Turkey
[5] Amity Univ, Dept Comp Sci & Engn, Noida, Uttar Pradesh, India
[6] UPES, Dept Comp Sci & Engn, Dehra Dun, Uttarakhand, India
关键词
Privacy preserving; Opportunistic computing; Artificial bee colony; Bio-inspired optimization;
D O I
10.1007/s11227-021-03720-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless computing has revolutionized our life with the technological advancement from the traditional networking into a new epoch for communication in ad hoc decorum. An energy efficient network of sensors based on wireless communication and networking principles can enhance the effectiveness of computing during unpredictable circumstances. If a computable required resource is readily available within the reachable region and it is identified to be idle and it is ready to share the corresponding information from its end without affecting the normal behavior of the device or the node, then there exists an opportunity to utilize those resources for computing. Opportunistic computing has a great potential of growth in the field of wireless ad hoc network computing. In traditional network computing technology, mobile computing, grid computing, distributed computing, ubiquitous computing and cloud computing, formerly ensues the communication with minimal resources currently available at the terminal point. This paper proposes a novel framework for an effective utilization of sharable resources, which are available within the reachable region, by creating an opportunity to frame an opportunistic computing while preserving the user's privacy. The proposed framework adopts a bio-inspired technique for identifying and collecting resources information, and thereby recognizes which resource is ready to participate in the opportunistic computing. Experimental results of a system that implements the bio-inspired technique along with the natural behavior of the bee colony approach was analyzed and found that the proposed system shows comparatively high performance in terms of computation resource searching, identifying, emergency data transfer, and participative node privacy preserving.
引用
收藏
页码:11099 / 11134
页数:36
相关论文
共 44 条
[1]   An efficient truthfulness privacy-preserving tendering framework for vehicular fog computing [J].
Alamer, Abdulrahman ;
Basudan, Sultan .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2020, 91
[2]   A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems [J].
Arachchige, Pathum Chamikara Mahawaga ;
Bertok, Peter ;
Khalil, Ibrahim ;
Liu, Dongxi ;
Camtepe, Seyit ;
Atiquzzaman, Mohammed .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) :6092-6102
[3]   Honey bee behavior inspired load balancing of tasks in cloud computing environments [J].
Babu, Dhinesh L. D. ;
Krishna, P. Venkata .
APPLIED SOFT COMPUTING, 2013, 13 (05) :2292-2303
[4]   Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds [J].
Belguith, Sana ;
Kaaniche, Nesrine ;
Laurent, Maryline ;
Jemai, Abderrazak ;
Attia, Rabah .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 :1-20
[5]   ARIES: Evaluation of a reliable and privacy-preserving European identity management framework [J].
Bernal Bernabe, Jorge ;
David, Martin ;
Torres Moreno, Rafael ;
Presa Cordero, Javier ;
Bahloul, Sebastien ;
Skarmeta, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 :409-425
[6]   Privacy-preserving aware data transmission for IoT-based e-health [J].
Boussada, Rihab ;
Hamdane, Balkis ;
Elhdhili, Mohamed Elhoucine ;
Saidane, Leila Azouz .
COMPUTER NETWORKS, 2019, 162
[7]   Privacy-preserving semi-parallel logistic regression training with fully homomorphic encryption [J].
Carpov, Sergiu ;
Gama, Nicolas ;
Georgieva, Mariya ;
Troncoso-Pastoriza, Juan Ramon .
BMC MEDICAL GENOMICS, 2020, 13 (Suppl 7)
[8]   Privacy Preserving Face Recognition Utilizing Differential Privacy [J].
Chamikara, M. A. P. ;
Bertok, P. ;
Khalil, I. ;
Liu, D. ;
Camtepe, S. .
COMPUTERS & SECURITY, 2020, 97
[9]   Energy saving strategies for cooperative cache replacement in mobile ad hoc networks [J].
Chan, Edward ;
Li, Wenzhong ;
Chen, Daoxu .
PERVASIVE AND MOBILE COMPUTING, 2009, 5 (01) :77-92
[10]  
Chandramohan D., 2015, BIO COMP BIOINSPIRED