A bio-inspired privacy-preserving framework for healthcare systems

被引:25
作者
Dhasarathan, Chandramohan [1 ]
Kumar, Manish [2 ]
Srivastava, Atul Kumar [3 ]
Al-Turjman, Fadi [4 ]
Shankar, Achyut [5 ]
Kumar, Manoj [6 ]
机构
[1] Madanapalle Inst Technol & Sci, Dept Comp Sci & Engn, Madanapalle, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai, Tamil Nadu, India
[3] Amity Univ, Dept IT & Engn, Tashkent, India
[4] Near East Univ, Dept Artificial Intelligence Engn, Res Ctr AI & IoT, Mersin 10, Nicosia, Turkey
[5] Amity Univ, Dept Comp Sci & Engn, Noida, Uttar Pradesh, India
[6] UPES, Dept Comp Sci & Engn, Dehra Dun, Uttarakhand, India
关键词
Privacy preserving; Opportunistic computing; Artificial bee colony; Bio-inspired optimization;
D O I
10.1007/s11227-021-03720-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless computing has revolutionized our life with the technological advancement from the traditional networking into a new epoch for communication in ad hoc decorum. An energy efficient network of sensors based on wireless communication and networking principles can enhance the effectiveness of computing during unpredictable circumstances. If a computable required resource is readily available within the reachable region and it is identified to be idle and it is ready to share the corresponding information from its end without affecting the normal behavior of the device or the node, then there exists an opportunity to utilize those resources for computing. Opportunistic computing has a great potential of growth in the field of wireless ad hoc network computing. In traditional network computing technology, mobile computing, grid computing, distributed computing, ubiquitous computing and cloud computing, formerly ensues the communication with minimal resources currently available at the terminal point. This paper proposes a novel framework for an effective utilization of sharable resources, which are available within the reachable region, by creating an opportunity to frame an opportunistic computing while preserving the user's privacy. The proposed framework adopts a bio-inspired technique for identifying and collecting resources information, and thereby recognizes which resource is ready to participate in the opportunistic computing. Experimental results of a system that implements the bio-inspired technique along with the natural behavior of the bee colony approach was analyzed and found that the proposed system shows comparatively high performance in terms of computation resource searching, identifying, emergency data transfer, and participative node privacy preserving.
引用
收藏
页码:11099 / 11134
页数:36
相关论文
共 44 条
  • [1] An efficient truthfulness privacy-preserving tendering framework for vehicular fog computing
    Alamer, Abdulrahman
    Basudan, Sultan
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2020, 91
  • [2] [Anonymous], 2005, Technical Report-TR06
  • [3] A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems
    Arachchige, Pathum Chamikara Mahawaga
    Bertok, Peter
    Khalil, Ibrahim
    Liu, Dongxi
    Camtepe, Seyit
    Atiquzzaman, Mohammed
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) : 6092 - 6102
  • [4] Honey bee behavior inspired load balancing of tasks in cloud computing environments
    Babu, Dhinesh L. D.
    Krishna, P. Venkata
    [J]. APPLIED SOFT COMPUTING, 2013, 13 (05) : 2292 - 2303
  • [5] Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds
    Belguith, Sana
    Kaaniche, Nesrine
    Laurent, Maryline
    Jemai, Abderrazak
    Attia, Rabah
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 1 - 20
  • [6] ARIES: Evaluation of a reliable and privacy-preserving European identity management framework
    Bernal Bernabe, Jorge
    David, Martin
    Torres Moreno, Rafael
    Presa Cordero, Javier
    Bahloul, Sebastien
    Skarmeta, Antonio
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 409 - 425
  • [7] Privacy-preserving aware data transmission for IoT-based e-health
    Boussada, Rihab
    Hamdane, Balkis
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    [J]. COMPUTER NETWORKS, 2019, 162
  • [8] Privacy-preserving semi-parallel logistic regression training with fully homomorphic encryption
    Carpov, Sergiu
    Gama, Nicolas
    Georgieva, Mariya
    Troncoso-Pastoriza, Juan Ramon
    [J]. BMC MEDICAL GENOMICS, 2020, 13 (Suppl 7)
  • [9] Privacy Preserving Face Recognition Utilizing Differential Privacy
    Chamikara, M. A. P.
    Bertok, P.
    Khalil, I.
    Liu, D.
    Camtepe, S.
    [J]. COMPUTERS & SECURITY, 2020, 97
  • [10] Energy saving strategies for cooperative cache replacement in mobile ad hoc networks
    Chan, Edward
    Li, Wenzhong
    Chen, Daoxu
    [J]. PERVASIVE AND MOBILE COMPUTING, 2009, 5 (01) : 77 - 92