PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Fuzzy Logic Based Intelligent Data Sensitive Security Model for Big Data in Healthcare

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
An intelligent security model for the big data environment is presented in this paper. The proposed security framework is data sensitive in nature and the level of security offered is defined on the basis of the data secrecy standard. The application area preferred in this work is the healthcare sector where the amount of data generated through the digitization and aggregation of medical equipment’s readings and reports is huge. The handling and processing of this great amount of data has posed a serious challenge to the researchers. The analytical outcomes of the study of this data are further used for the advancement of the medical prognostics and diagnostics. Security and privacy of this data is also a very important aspect in healthcare sector and has been incorporated in the healthcare act of many countries. However, the security level implemented conventionally is of same level to the complete data which not a smart strategy considering the varying level of sensitivity of data. It is inefficient for the data of high sensitivity and redundant for the data of low sensitivity. An intelligent data sensitive security framework is therefore proposed in this paper which provides the security level best suited for the data of given sensitivity. Fuzzy logic decision making technique is used in this work to determine the security level for a respective sensitivity level. Various patient attributes are used to take the intelligent decision about the security level through fuzzy inference system. The effectiveness and the efficacy of the proposed work is verified through the experimental study.
Twórcy
autor
  • Dr. A. P. J. Abdul Kalam University, Indore, India
  • Dr. A. P. J. Abdul Kalam University, Indore, India
Bibliografia
  • [1] S. Sharathkumar and G. Jagadamba, “Adaptive content-aware access control of EPR resource in a healthcare system,” 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, 2017, pp. 205-210. http://dx.doi.org/10.1109/ICACCI.2017.8125841
  • [2] M. Jayabalan and T. O'Daniel, “Continuous and transparent access control framework for electronic health records: A preliminary study,” 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, 2017, pp. 165-170. http://dx.doi.org/10.1109/ICITISEE.2017.8285487
  • [3] R. Sánchez-Guerrero, F. A. Mendoza, D. Díaz-Sánchez, P. A. Cabarcos and A. M. López, “Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management,” in IEEE Journal of Biomedical and Health Informatics, vol. 21, no. 6, pp. 1741-1749, Nov. 2017. http://dx.doi.org/10.1109/JBHI.2017.2655419
  • [4] A. Dev Mishra and Y. Beer Singh, “Big data analytics for security and privacy challenges,” 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 50-53. https://doi.org/10.1109/CCAA.2016.7813688
  • [5] Beyer, Mark “Gartner Says Solving 'Big Data' Challenge Involves More Than Just Managing Volumes of Data,” Archived from the original on July 2011. Retrieved 13 July 2011
  • [6] “Large-Scale Adaptive Machine Learning for Security Analytics, Ling Huang,” Joint work with ISTC and McAfee Labs ISTC Summer Retreat, OS/3112013.
  • [7] Kim S-H., Kim N-U., Chung T-M., “Attribute relationship evaluation methodology for big data security,” In: 2013 International Conference on IT convergence and security (ICITCS), IEEE. p. 1–4, 2013. https://doi.org/10.1109/ICITCS.2013.6717808
  • [8] “Data-driven healthcare organizations use big data analytics for big gains,” IBM white paper February. 2013.3
  • [9] A. Yazan, W. Yong, N. Raj Kumar, “Big data life cycle: threats and security model,” In 21st Americas conference on information systems, 2015.
  • [10] R. Zhang, L. Liu, “Security models and requirements for healthcare application clouds,” In: IEEE 3rd international conference on cloud computing. 2010. https://doi.org/10.1109/CLOUD.2010.62
  • [11] Xindong WU, Gong Qing WU and Wei Ding, “Data Mining with Big Data,” IEEE Transaction on Knowledge and Data Engineering, vol. 26, no. 1, pp. 97-107, Dec. 2012. https://doi.org/10.1109/TKDE.2013.109
  • [12] G. Ghinita, “Privacy for location-based services synthesis,” Lectures on Information Security, Privacy, and Trust, University of Massachusetts, Boston, Tech. Rep., April 2013. https://doi.org/10.2200/S00485ED1V01Y201303SPT004
  • [13] X. Liang, R. Lu, L. Chen, X. Lin, and X. Shen, “Pec: A privacy preserving emergency call scheme for mobile healthcare social networks,” Communications and Networks, Journal of, vol. 13, no. 2, pp. 102–112, April 2011. http://dx.doi.org/10.1109/JCN.2011.6157409
  • [14] M. A. D. Mashima, D. Bauer and D. Blough, “User-centric identity management architecture using credential-holding identity agents,” Digital Identity and Access Management: Technologies and Frameworks, IGI Global, December 2012. https://dx.doi.org/10.4018/978-1-61350-498-7.ch005
  • [15] F. Paci, R. Ferrini, A. Musci, K. Steuer, and E. Bertino, “An interoperable approach to multifactor identity verification,” IEEE Computer, vol. 42, no. 5, pp. 50–57, 2009. http://dx.doi.org/10.1109/MC.2009.142
  • [16] R. Lu, X. Lin, and X. Shen, “Spoc: A secure and privacy preserving opportunistic computing framework for mobile-healthcare emergency,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 3, pp. 614–624, March 2013. http://dx.doi.org/10.1109/TPDS.2012.146
  • [17] L. Sweeney, “Achieving k-anonymity privacy protection using generalization and suppression,” Int J Uncertain Fuzziness Knowl Based Syst. 2002;10:571–88. https://doi.org/10.1142/S021848850200165X
  • [18] P. Samrati, “Protecting respondents’ identities in microdata release,” IEEE Trans Knowl Data Eng. 2001;13:1010–27. https://doi.org/10.1109/69.971193
  • [19] TM Truta, B. Vinay, “Privacy protection: p-sensitive k-anonymity property,” In: Proceedings of 22nd international conference on data engineering workshops. 2006. p. 94. https://doi.org/10.1109/ICDEW.2006.116
  • [20] A. Mohan, DM. Blough, “An attribute-based authorization policy framework with dynamic conflict resolution,” In Proceedings of the 9th symposium on identity and trust on the internet. 2010. https://doi.org/10.1145/1750389.1750395
  • [21] H. Zhou, Q. Wen, “Data security accessing for HDFS based on attribute-group in cloud computing,” In International conference on logistics engineering, management and computer science (LEMCS 2014), 2014. https://doi.org/10.2991/lemcs-14.2014.255
  • [22] H. Wang, J. Yin, C.S. Perng, & P. S. Yu, (2008, October), “Dual encryption for query integrity assurance,” In Proceedings of the 17th ACM conference on Information and knowledge management (pp. 863-872). ACM. https://doi.org/10.1145/1458082.1458196
  • [23] J. Shafer, S. Rixner, Cox AL., “The hadoop distributed filesystem: balancing portability and performance,” In Proceedings of 2010 IEEE international symposium on performance analysis of systems & software (ISPASS), March 2010, White Plain, NY. p. 122–33. https://doi.org/10.1109/ISPASS.2010.5452045
  • [24] I. Tal, G.-M. Muntean, Towards Reasoning Vehicles:, “A Survey of Fuzzy Logic Based Solutions in Vehicular Networks,” ACM Comput. Surv. 2018, 50, 80. http://dx.doi.org/10.1145/3125640
  • [25] P. Tillapart, T. Thumthawatworn, P. Viriyaphol, P. Santiprabhob, “Intelligent handover decision based on fuzzy logic for heterogeneous wireless networks,” In Proceedings of the 2015 12th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Hua Hin, Thailand, 24–27 June 2015, pp. 1–6. https://doi.org/10.1109/ECTICon.2015.7207076
  • [26] C. Yang, W. Lin, M. Li, “A novel triple encryption scheme for hadoop-based cloud data security,” In Emerging intelligent data and web technologies (EIDWT), 2013 fourth international conference on. 2013. p. 437–42. https://doi.org/10.1109/EIDWT.2013.80
  • [27] Federal Information Processing Standards Publication 197. Specification for the advanced encryption standards (AES). 2001. https://doi.org/10.6028/NIST.FIPS.197
Uwagi
1. Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
2. Na stronie internetowej czasopisma artykuł ma tytuł : ''Intelligent Data Sensitive Security Model for Big Data in Healthcare using Fuzzy Logic'', natomiast w PDF artykuł ma tytuł: ''Fuzzy Logic Based Intelligent Data Sensitive Security Model for Big Data in Healthcare''.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-253780a3-1829-4691-9763-252efbade767
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.