Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud

被引:8
作者
Shanmugapriya, E. [1 ]
Kavitha, R. [2 ]
机构
[1] Anna Univ Chennai, Coll Engn Guindy, Madurai, Tamil Nadu, India
[2] Velammal Coll Engn & Technol, Madurai, Tamil Nadu, India
关键词
Big data; Cloud; Optimization; Data security; Medical data; Clustering; Classification and encryption;
D O I
10.1007/s10916-019-1374-6
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Big Data and cloud computing are two essential issues in the recent years, empowers computing resources to be given as Information Technology services with high efficiency and effectiveness. So as to protect the security of data holders, data are regularly stored in the cloud in an encrypted form. In any case, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud along with access control. In this paper dissected the medical big data security utilizing encryption with access control process. Big database reduce process Map-Reduce framework with Optimal Fuzzy C means (OFCM) to Clustered data are accumulated in the cloud and furthermore using classification approach to classify sensitive and non-sensitive data in the cloud to encryption. This security process Triple DES (TDES) to encrypted and stored in the cloud and propose practical optimization techniques that further enhance the scheme's performance, at long last authentication phase with attribute-based access control is used to authenticate data in cloud sim. From the proposed method the clustering, classification and encryption results are compared to existing approaches.
引用
收藏
页数:12
相关论文
共 31 条
[1]   A novel hybridization strategy for krill herd algorithm applied to clustering techniques [J].
Abualigah, Laith Mohammad ;
Khader, Ahamad Tajudin ;
Hanandeh, Essam Said ;
Gandomi, Amir H. .
APPLIED SOFT COMPUTING, 2017, 60 :423-435
[2]  
Bernice M, 2014, J CONTROL AUTOMATION, P1
[3]   A two-party privacy preserving set intersection protocol against malicious users in cloud computing [J].
Cao, Xuefei ;
Li, Hui. ;
Dang, Lanjun ;
Lin, Yin .
COMPUTER STANDARDS & INTERFACES, 2017, 54 :41-45
[4]   An Architecture to Support the Collection of Big Data in the Internet of Things [J].
Cecchinel, Cyril ;
Jimenez, Matthieu ;
Mosser, Sebastien ;
Riveill, Michel .
2014 IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2014, :442-449
[5]   Scalable Gaussian Kernel Support Vector Machines with Sublinear Training Time Complexity [J].
Feng, Chang ;
Liao, Shizhong .
INFORMATION SCIENCES, 2017, 418 :480-494
[6]   Big Data with Cloud Computing: an insight on the computing environment, MapReduce, and programming frameworks [J].
Fernandez, Alberto ;
del Rio, Sara ;
Lopez, Victoria ;
Bawakid, Abdullah ;
del Jesus, Maria J. ;
Benitez, Jose M. ;
Herrera, Francisco .
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2014, 4 (05) :380-409
[7]  
Gheid Z, 2016, IEEE TRUST, P791, DOI [10.1109/TrustCom.2016.0140, 10.1109/TrustCom.2016.319]
[8]   An effective model for store and retrieve big health data in cloud computing [J].
Goli-Malekabadi, Zohreh ;
Sargolzaei-Javan, Morteza ;
Akbari, Mohammad Kazem .
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2016, 132 :75-82
[9]   A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud [J].
Hu, Guiqiang ;
Xiao, Di ;
Xiang, Tao ;
Bai, Sen ;
Zhang, Yushu .
INFORMATION SCIENCES, 2017, 387 :132-145
[10]  
Jha S, 2005, LECT NOTES COMPUT SC, V3679, P397