A Survey on Securing and Optimizing Health Care Bigdata

Authors

  • K. Kavitha

  • D. Anuradha

  • P. Pandian

How to Cite

Kavitha, K., Anuradha, D., & Pandian, P. (2018). A Survey on Securing and Optimizing Health Care Bigdata. International Journal of Engineering and Technology, 7(4.10), 504-507. https://doi.org/10.14419/ijet.v7i4.10.21212

Received date: October 7, 2018

Accepted date: October 7, 2018

Published date: October 2, 2018

DOI:

https://doi.org/10.14419/ijet.v7i4.10.21212

Keywords:

Big-data, Healthcare, Information security, Optimization, Multi-objective optimization, Simulation.

Abstract

Huge amount of health care data are available online to improve the overall performance of health care system. Since this huge health care Big-data is valuable and sensitive, it requires safety. In this paper we analyze numerous ways in which the health care Big-data can be protected. In recent days many augmented security algorithm that are suitable for Big-data have emerged like, El-Gamal, Triple-DES, and Homomorphic algorithms. Also authentication and access control can be implemented over Big-data using Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) schemes.

Along with security to Big-data we try to evolve the ways in which the valuable Big-data can be optimized to improve the Big-data analysis. Mathematical optimization techniques such as simple and multi-purpose optimization and simulation are employed in Big-data to maximize the patient satisfaction and usage of doctor’s consulting facility. And also, to minimize the cost spent by patient and energy wasted.

 

 

References

  1. [1] AlexandruSoceanu, AlexandruEgner, TraianMuntean (2015), Managing the Privacy and Security of eHealth Data. 20th International Conference on Control Systems and Science, 978-1-4799-1780-8/15 $31.00 © IEEE.

    [2] AmineRahmani, Abdelmalek Amine and Mohamed Reda Hamou (2015), A mathematical model of access control in big data using confidence interval and digital signature. Computer Science and Information Technology, 183-198.

    [3] Arthur C (2011), PlayStation Network: hackers claim to have 2.2m credit cards. The Guardian Technology Blog. http://www.guardian.co.uk/technology/blog/2011/apr/29/playstationnetwork-hackers-credit-cards.

    [4] Balana, open source XACML 3.0 implementation http://xacmlinfo.org/category/balana.

    [5] Brosette SE, Spragre AP, Jones WT, Moser SA (2000),A data mining system for infection control surveillance. Methods Inf Med, 303-310.

    [6] DananThilakanathan, Yu Zhao, Shiping Chen, Surya Nepal, Rafael CalvoandAbelardo Pardo A (2014), Protecting and Analysing Health Care Data on Cloud“,978-1-4799-8085-7/14 $31.00 ©IEEE

    [7] Dolski S, Huonder F and Oberholzer S (2007), HERAS-AF: XACML 2.0 Implementation, Technical Report, University of Applied Sciences Rapperswil.

    [8] Enterprise-Java-XACML, http://code.google.com/p/enterprise-javaxacml

    [9] Hagner M (2007), Security infrastructure and national patent summary. In Tromso Telemedicine and eHealth Conference.

    [10] Halamka JD (2015), Using Big Data to Make Wiser Medical Decisions, Harvard Business Review,[Online]. Available: https://hbr.org/2015/12/using-big-data-to-makewiser-medical-decisions.

    [11] Hamid Reza Feili (2013), Improving the health care systems performance by simulation optimization. Journal of Mathematics and Computer Science, 7. 73-79.

    [12] Healthcare costs rise to $130bn, or $5800 per Australian: report. http://www.news.com.au/lifestyle/health/health-spending-reaches-130b-report/story-fneuz9ev-1226481443042

    [13] Indiana Health Information Exchange (2016), http://www.ihie.org

    [14] Kaluvuri S, Egner A, Hartog J and Zannone N (2015), SAFAX – An Extensible Authorization Service for Cloud Environments, Frontiers in Computer and Network Security.

    [15] Karvelas P (2014), Australias mental health system must become more efficient. The Australian. Source: http://www.theaustralian.com.au/nationalaffairs/policy/australiasmental-health-system-must-become-more-efficient/story-fn59nokw-1226850819260.

    [16] Ko SY, Jeon K, Morales R (2011), The HybrEx model for confidentiality and privacy in cloud computing. In: 3rd USENIX workshop on hot topics in cloud computing, HotCloud’11, Portland.

    [17] KupwadePatil H and Seshadri R (2014), Big Data Security and Privacy Issues in Healthcare, IEEE International Congress on Big Data, 762–765.

    [18] Laila En-nahli, Hamid Allaoui and IssamNouaouri (2015), A multi-objective modelling to human resource assignment and routing problem for home health care services. Science Direct, 698-703.

    [19] Liu A, Chen F, Hwang J and Xie T (2011), Designing fast and scalable XACML policy evaluation engines. IEEE Trans. Computers, 60(12) 1802-1817.

    [20] Liu S (2013), Exploring the Future of Computing. IT Professional, vol. 15(1), 2–3.

    [21] Marr B (2015), How Big Data Is Changing Healthcare. Forbes, [Online]. Available: http://onforb.es/1bfRQ0b.

    [22] Mohan A, Blough DM (2010), An Attribute-Based Authorization Policy Framework with Dynamic Conflict Resolution. Proceedings of the 9th Symposium on Identity and Trust on the Internet.

    [23] Patrizio A (2007), Salesforce.com Scrambles To Halt Phishing Attacks. Internet News.com. http://www.internetnews.com/ent-news/article.php.

    [24] Priyank J, Manasi G and Nilay K (2016), Big data privacy: a technological perspective and review. In Journal of Big Data.

    [25] RuiZhangand Ling Liu (2010), Security Models and Requirements for Healthcare Application Clouds. IEEE 3rd International Conference on Cloud Computing.,

    [26] Samanthula BK, Elmehdwi Y and Jiang W (2015), K-nearest neighbour classification over semantically secure encrypted relational data. IEEE Transactions on Knowledge and Data Engineering, vol. 27(5), 1261–1273.

    [27] Sathya S, Sethukarasi T (2016), Efficient privacy preservation technique for healthcare records using big data. International Conference On Information Communication And Embedded System (ICICES) 978-1-5090-2552-7.

    [28] Science Applications International Corporation (2004) (SAIC). Role-Based Access Control (RBAC) Role Engineering Process Version 3.0.

    [29] Sun’sXCAMLImplementation,http://sunxacml.sourceforge.net/

    [30] Ulusoy H, Kantarcioglu M, Pattuk E and Kagal L (2015), Accountable MR: Toward accountable MapReduce systems. IEEE International Conference on Big Data, 451–460.

    [31] VassilikiKoufi, Flora Malamateniou and George Vassilacopoulos (2015), A big data driven model for the optimization of healthcare processes, European Federation for Medical Informatics, 697-701.

    [32] Vishnu S Basuthkar, ChetanaSrinivas (2016), A survey of cost effective big data in healthcare applications. International Journal of Computer Applications, 23-27.

    [33] Waqar A, Raza A, Abbas H and Khurram Khan M (2013), A framework for preservation of cloud users data privacy using dynamic reconstruction of metadata. Journal of Network and Computer Applications, vol. 36(1), 235–248.

Downloads

How to Cite

Kavitha, K., Anuradha, D., & Pandian, P. (2018). A Survey on Securing and Optimizing Health Care Bigdata. International Journal of Engineering and Technology, 7(4.10), 504-507. https://doi.org/10.14419/ijet.v7i4.10.21212

Received date: October 7, 2018

Accepted date: October 7, 2018

Published date: October 2, 2018