Privacy-Preserving Models for Efficient Healthcare Big Data sharing in Cloud

Table of contents

Healthcare data is highly confidential and thus sharing of those data is complex. But to diagnose a patient, the professionals need to access their healthcare data. Those data will be in the form of Electronic Medical Record (EMR) which includes multimedia data like X-ray, Scan and ECG. Size of the EMR is rapidly growing thus it is to be stored in format of Big Data.

Major issue in Big Data is privacy, as EMR is taken into account a tiny change in data could create a larger impact. Data theft attack is considered to be the serious security breaches of Big Data. On the other hand limiting the access of EMR must not restrict the data flow within the authorized users.

Introduction

Every data across the world is converted into digital formats. This leads to the entry of digital technologies into the medical sector. As a result both health care data and patient data in clinical models have been digitalized. This improvement is greatly supported by the usage of variety of software in hospitals, increase in the number of mobile device users, consulting of doctors over the world through fast internet.

Increase in size of health care data has paved the way to make use of Big data analytics. Usage of this technology brings lot of improvements in the healthcare sector but there are some issues and challenges in maintaining them. These issues and challenges were becoming stronger nowadays. In addition, healthcare organizations found that a highly responsive, so they use technology-centric approach for detecting the security and privacy requirements but it is not enough to protect the medical data and its patients.

Motivated thus, organizations have moved in the development of new security mechanisms to prevent the sensitive medical data being accessed or misused. In this paper we discuss some related works, the risks to the big health data security and some latest technologies to cover these risks. Lastly, we offer conclusions and highlight the future directions.

Literature Review

  1. S.Jegadeesan et al (2016) describes when authenticated user attempt to access the system by giving an input, the source will not directly reach the server. The system maintains two tables to regulate the authentication which includes index table and privacy table. Index table has only the basic patient details that can be allowed to access publicly. Privacy table contains the medical data about the patients that will be accessed using a private key. Private Key is given only to the authorized user like organization head, consulting doctor or patient. Patient will not be allowed to edit the medical data in private table. This makes both the data will be available to public and also the patient details will be secured.
  2. Kingsford Kissi Mireku et al (2017) describes when using a single index table for storing large data it causes distortion of patient health data. This causes the data loss and also allows unauthorized users from accessing them. The idea behind the paper is to use two index tables such that mapping of input data to patient data will remain accurate. One table is named as alpha table that contains the identification of the mapping data of patients. Another is beta table that maps the identification with the patient data. These tables are not dependent with each other. Map reduce technique is used to produce a better and an optimal result when using two index tables.
  3. Yang Yang et al (2016) describes an optimal way to access the healthcare data by using a keyword search. Keyword is generated by the patient or the authority responsible to maintain the healthcare data. Keywords are to be unique and privacy comes into a main role. Generally keywords are generated and are used directly to search a incidence of data but in this paper keyword is encrypted after generation. The user requesting to access the health data must use the encrypted keyword which is again reencrypted by the proxy. Encrypting the keyword twice will protect the keywords from attackers as keyword does not remain the same.
  4. Qinlong Huang et al (2017) describes a healthcare model designed for smart cities where social network is used along with the healthcare data to analyse the healthcare reports. Providing access of health data in social network remains as a great challenge to privacy aspects. There is high Possibility of data being modified and addition of corrupted data. Both Health data and social data are encrypted separately. The resultant cipher text is given to the users for accessing the data. Users can be healthcare providers as well as social users. Data can be added even by using various sensors into the cloud for analysing.
  5. Pengliang Liu et al (2014) describes the mechanism used to access the secured data. Generation of key remains as main phase to balance the security issues. An algorithm known as KP-ABE is used to generate the key for accessing the data. It can be expanded as key policy attribute based encryption, which deals with using certain attributes to generate the key. Uniqueness of the key is the drastic advantage of using this technique as individual attributes of the system is considered during key generation. These key could be again verified using attributes listed in the system.
  6. Wenyi Liu et al (2017) describes the prevention of hacker accessing health data using profile matching techniques. When the access request is given to the server, a unique token is generated and send to the requestor. The requestor must handover the token to the content manager. Work of content manager is to verify both the token received and the profile that has sent the request. Profile match is found only if the request is from the authenticated user. After verification the content manager would forward the requested data to the user. In this paper various factors like profile aspects, token, user request were verified before providing access to data this increases the efficiency of privacy preserving.
  7. Chengyu Hu et al (2012) describes solution to deal with the keyword guessing attack. Keywords are shared to the users of the data. The keywords can be easily guessed and are made available for attack by the hackers. To overcome that designated tester is used to check the keywords. The system without tester returns the data only by using the keywords searched it can be done by unauthorized user also. In this paper a checker will enable data only to the registered or authorized users.
  8. Tatiana Ermakova et al (2017) describe the variation in storage spaces every time the data is updated. As the patient enters his medical data in cloud it will be shared in a server and maintained there. Hacking of data from that server could bring a great threat to privacy concern. In this paper the data is stored in various cloud servers every time the data is updated. This paves the way for a multiple cloud provider. Maintaining of patient history is the great challenge in this system as there is a constant shift in the cloud provider.

Methodology

It is assumed that KP-ABE algorithm could be combined along with data sharing to overcome the security issues. Doctors can enrol their data in server by giving their personal information, medical practice certificate number. After they registered, they have to wait for some time until their registration is accepted by administrator or higher officials like administrator or dean of doctors committee. After their registration is accepted by administrator, they can log into the server by giving their user id and password.

After that they have to give a secret key which is generated and sent by administrator. Here, Administrator has to be approved /reject the doctor’s application based on their certificate and practice term. Whenever a doctor is logged in, a unique and secret key is generated based on KP-ABE technique for him by administrator. All the personal and health information are registered by a doctor who is taking care of the patient initially. After the registration process, one time unique id is generated for that patient.

This id is informed by doctor to the patient either by in person or through mail id or mobile number. Regarding health information, doctor has to give blood pressure, blood test report, scan report, ECG report and lot if they have any other information about patient’s health. Once patient’s information is registered in the server, he can go to any doctor in the world for the treatment. First, patient has to give his patient id to the doctor who is going to take the treatment for him at present.

After that his previous health information, treatment, doctor name, previously taken medicine are accessed from the server and shown on doctor’s screen. And then the doctor has to add the medicine details which is prescribed by him and he can add the scan reports, ECG reports, surgery details and other test reports. Patient also can view his personal and health information by giving his patient id and finger print.

Fingerprint of the existing users are verified before new users are registered. If the finger print already exists, an error message is send to the new user. If new finger print does not match any of the available fingerprint registration will be completed, by this way replication will be avoided.

Conclusion

Among the proposed systems discussed in this paper that can protect the privacy of clients and the intellectual property of Health service providers usage of KP-ABE technique remains effective. Since patient health information’s are maintained in the server individually their PHR couldn’t be lost. So health records can be only accessed by authorized users. To conclude, for small companies with security constrains, this design helps them to reduce the burden by applying KP-ABE.

Reference

  1. A Privacy-Preserving Multi-factor Cloud Authentication System Utilizing Big Data, Wwnyi Liu, A. Selcuk Uluagac, Raheem Beyah, of 2012
  2. An enhanced searchable public key encryption scheme with a designated tester and its extensions, chengyu Hu, pengtao Liu, of 2012 Journal of Computers, Vol. 7, No.3
  3. Conjunctive Keyword Search with designated tester and timing enable proxy re-encryption function for E-health cloud, yang yang, maode ma, of 2012 IEEE transaction on information forensics and security
  4. Efficient Privacy preservation techniques for maintaining healthcare records using big data, S.Jegadeesan, S.Pooja, T.Vidhya, of 2016 International Journal of innovative research in computer and communication Engineering
  5. Efficient Verifiable Public Key Encryption with keyword search based on KP-ABE, Pengliang Liu, Jianfeng wang, Hua Ma, Haixin Nie, of 2014 Ninth International Conference on Broadband and Wireless Computing
  6. Hybrid privacy preservation framework for healthcare data publishing, Kingsford Kissi Mireku, Zhang FengLi, Kittur Philemon kibiwott, of 2017
  7. Secret sharing for health data in multi-provider clouds, Tatiana Ermakova, Benjamin Fabian, of 2017 IEEE International conference on Cloud Data sharing
  8. Secure and privacy-Preserving Data sharing and collaboration in Mobile Healthcare Social Networks in Smart cities, Qinlong Huang, Licheng wang, Yixian yang, of 2017 Hindawi security and communication networks. american journal of engineering research.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyStudyWriters
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Criminal Justice
The paper was not accused of plagiarism and was written very well. I will let you know the grade once it is graded. Thank you
Customer 452671, April 26th, 2021
Social Work and Human Services
Great work I would love to continue working with this writer thought out the 11 week course.
Customer 452667, May 30th, 2021
Business and administrative studies
excellent job
Customer 452773, March 12th, 2023
Management
Love this writer!!! Great work
Customer 452597, April 5th, 2021
Business and administrative studies
Excellent work ,always done early
Customer 452773, February 21st, 2023
Nursing
I just need some minor alterations. Thanks.
Customer 452547, February 10th, 2021
fin571
EXCELLEN T
Customer 452773, March 21st, 2024
Philosophy
Thank you
Customer 452811, February 17th, 2024
Human Resources Management (HRM)
excellent job
Customer 452773, July 17th, 2023
Business Studies
Thank you very much for a good job done and a quick turn around time.
Customer 452615, March 31st, 2021
Business and administrative studies
excellent work
Customer 452773, March 12th, 2023
Data 564
excellent work
Customer 452773, April 11th, 2024
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp