Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment
Abstract
:1. Introduction
- The purpose of the Prvsec-Sanitize is to offer a cloud-based healthcare big data environment with an improved security mechanism.
- The Boost Graph Convolutional Network Clustering (BGCNC) technique is a quick and memory-efficient training algorithm that lowers computational complexity in terms of time and memory measures.
- Even when traditional algorithms perform well, they can still be enhanced to address flaws and increase the bar. The traditional PSO method has certain drawbacks, such as poorer performance in a number of domains. The GWO algorithm also has poorer solution precision, slower convergence, and less successful local searching in addition to these drawbacks. Thus, more investigation is required to improve integration and robustness.
2. Literature Review
3. Proposed Method
3.1. Graph Convolutional Network Clustering (GCNC)
Boost Graph Convolutional Network Clustering (BGCNC)
- Certain links (the part in Equation (2)) are eliminated from the graph after it has been partitioned. As a result, the performance can be impacted.
- Algorithms for graph clustering frequently group related nodes together. As a result, a cluster’s distribution may deviate from the original data set, which could cause a skewed estimation of the complete gradient while doing SGD updates.
Algorithm 1: Boost Graph Convolutional Network Clustering |
1: Input: Graph A, Feature X, Label Y 2: Output: Node representation 3: Partition graph nodes into clusters 4: For do 5: Randomly choose clusters, from V without replacement; 6: From the subgraph with nodes and links 7: Compute (loss on the subgraph ); 8: Conduct adam update using gradient estimator 9: Output: |
3.2. Magnify Pinpointing-Based Encryption (MPBE)
Algorithm 2: Key generation |
1: Private key generator (PKG) starts the setup process and decides the security parameters like the level of bits and type of curves. 2: Bob obtains the master public key from PKG. 3: Bob authenticate himself by issuing his identity to PKG and receives the private key for encrypting the data. 4: Similarly, Alice obtains the master public key from PKG. 5: Alice authenticate herself by issuing his identity to PKG and receives the private key for encrypting the data. 6: Bob sends his identity to Alice for generating the public key related to Bob’s identity. Alice will use this key to decrypt the data authenticated by Bob. 7: Alice obtains Bob’s data from the database and decrypts it for accessing. |
3.2.1. Initial Phase
3.2.2. Generation Phase
3.2.3. Encryption Phase
3.2.4. Decryption Phase
3.3. Hybrid Fragment Horde Bland Lobo Optimization
3.3.1. Traditional PSO Algorithm
3.3.2. Traditional GWO Algorithm
3.3.3. Hybrid Fragment Horde Bland Lobo Optimization
Algorithm 3: Hybrid Fragment Horde Bland Lobo Optimization |
1: is the grey wolf population where j = 1, 2, N. Here, , and denote the best searching agent, the second-best searching agent, and the third-best searching agent, respectively. Moreover, e is the components, and H, E are coefficients. The goal of this algorithm is to output the best searching agent, . 2: { 3: Set initial values to the 4: Set initial values to e, H, and E also 5: Measure the fitness values of each searching agent, , , and . 6: while (u < max) do 7: { 8: for each searching agent, do 9: { 10: Revise the present location of the searching agents using Equation (25) 11: } 12: Revise e, H, and E 13: Assess fitness values for all searching agents 14: Revise , , and 15: u: = u + 1 16: } 17: return 18: } |
4. Results and Discussion
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Lv, Z.; Qiao, L. Analysis of healthcare big data. Future Gener. Comput. Syst. 2020, 109, 103–110. [Google Scholar] [CrossRef]
- Yang, Y.; Zheng, X.; Guo, W.; Liu, X.; Chang, V. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inf. Sci. 2019, 479, 567–592. [Google Scholar] [CrossRef]
- Hathaliya, J.J.; Tanwar, S. An exhaustive survey on security and privacy issues in Healthcare 4.0. Comput. Commun. 2020, 153, 311–335. [Google Scholar] [CrossRef]
- Meyer, A.N.; Giardina, T.D.; Khawaja, L.; Singh, H. Patient and clinician experiences of uncertainty in the diagnostic process: Current understanding and future directions. Patient Educ. Couns. 2021, 104, 2606–2615. [Google Scholar] [CrossRef] [PubMed]
- Premkamal, P.K.; Pasupuleti, S.K.; Alphonse, P.J.A. A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. J. Ambient Intell. Humaniz. Comput. 2019, 10, 2693–2707. [Google Scholar] [CrossRef]
- Chelladurai, M.U.; Pandian, S.; Ramasamy, K. A blockchain based patient centric electronic health record storage and integrity management for e-Health systems. Health Policy Technol. 2021, 10, 100513. [Google Scholar] [CrossRef]
- Available online: https://www.n-ix.com/big-data-healthcare-key-benefits-uses-cases/ (accessed on 31 May 2024).
- Razzaq, A. Blockchain-based secure data transmission for internet of underwater things. Clust. Comput. 2022, 25, 4495–4514. [Google Scholar] [CrossRef]
- Liu, J.; Liu, Z.; Sun, C.; Zhuang, J. A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns. J. Artifi. Intell. Technol. 2022, 2, 23–31. [Google Scholar] [CrossRef]
- Wang, T.; Ke, H.; Zheng, X.; Wang, K.; Sangaiah, A.K.; Liu, A. Big data cleaning based on mobile edge computing in industrial sensor-cloud. IEEE Trans. Industr. Inform. 2019, 16, 1321–1329. [Google Scholar] [CrossRef]
- Hosseinioun, P.; Kheirabadi, M.; Tabbakh, S.R.K.; Ghaemi, R. A new energy-aware tasks scheduling approach in fog computing using hybrid meta-heuristic algorithm. J. Parallel Distrib. Comput. 2020, 143, 88–96. [Google Scholar] [CrossRef]
- Shukla, D.K.; Ali, S.; Trivedi, M.C. Energy Aware Scheduling of Tasks in Cloud environment. Turk. Online J. Qual. Inq. 2021, 12, 8816. [Google Scholar]
- Papageorgiou, P. A Novel Framework for Maritime Security Assessments and Its Applications on the Shipping Industry. Cyber Security Examples. Ph.D. Thesis, Liverpool John Moores University, Liverpool, UK, 2022. [Google Scholar]
- Miyachi, K.; Mackey, T.K. hOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design. Inf. Process. Manag. 2021, 58, 102535. [Google Scholar] [CrossRef]
- Pramanik, P.K.D.; Pal, S.; Mukhopadhyay, M. Healthcare big data: A comprehensive overview. In Research Anthology on Big Data Analytics, Architectures, and Applications; IGI Global: Hershey, PA, USA, 2022; pp. 119–147. [Google Scholar]
- Riaz, S.; Khan, A.H.; Haroon, M.; Latif, S.; Bhatti, S. Big data security and privacy: Current challenges and future research perspective in cloud environment. In Proceedings of the 2020 International Conference on Information Management and Technology (ICIMTech), Bandung, Indonesia, 13–14 August 2020; pp. 977–982. [Google Scholar]
- Sauber, A.M.; El-Kafrawy, P.M.; Shawish, A.F.; Amin, M.A.; Hagag, I.M. A New Secure Model for Data Protection over Cloud Computing. Comput. Intell. Neurosci. 2021, 2021, 8113253. [Google Scholar] [CrossRef]
- Samaraweera, G.D.; Chang, J.M. Security and privacy implications on database systems in Big Data era: A survey. IEEE Trans. Knowl. Data Eng. 2019, 33, 239–258. [Google Scholar] [CrossRef]
- Amanullah, M.A.; Habeeb, R.A.A.; Nasaruddin, F.H.; Gani, A.; Ahmed, E.; Nainar, A.S.M.; Akim, N.M.; Imran, M. Deep learning and big data technologies for IoT security. Comput. Commun. 2020, 151, 495–517. [Google Scholar] [CrossRef]
- Ghayvat, H.; Pandya, S.N.; Bhattacharya, P.; Zuhair, M.; Rashid, M.; Hakak, S.; Dev, K. CP-BDHCA: Blockchain-based Confidentiality-Privacy preserving Big Data scheme for healthcare clouds and applications. IEEE J. Biomed. Health Inform. 2021, 26, 1937–1948. [Google Scholar] [CrossRef] [PubMed]
- Lv, Z.; Wang, L.; Guan, Z.; Wu, J.; Du, X.; Zhao, H.; Guizani, M. An optimizing and differentially private clustering algorithm for mixed data in SDN-based smart grid. IEEE Access 2019, 7, 45773–45782. [Google Scholar] [CrossRef]
- Shanmugapriya, E.; Kavitha, R. Medical big data analysis: Preserving security and privacy with hybrid cloud technology. Soft Comput. 2019, 23, 2585–2596. [Google Scholar] [CrossRef]
- Tian, Y.; Wang, Z.; Xiong, J.; Ma, J. A blockchain-based secure key management scheme with trustworthiness in DWSNs. IEEE Trans. Indus. Inform. 2020, 16, 6193–6202. [Google Scholar] [CrossRef]
- Chen, J.; Ramanathan, L.; Alazab, M. Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities. Microprocess. Microsyst. 2021, 81, 103722. [Google Scholar] [CrossRef]
- Iqbal, S.; Kiah, M.L.M.; Zaidan, A.A.; Zaidan, B.B.; Albahri, O.S.; Albahri, A.S.; Alsalem, M.A. Real-time-based E-health systems: Design and implementation of a lightweight key management protocol for securing sensitive information of patients. Health Technol. 2019, 9, 93–111. [Google Scholar] [CrossRef]
- Elhoseny, M.; Haseeb, K.; Shah, A.A.; Ahmad, I.; Jan, Z.; Alghamdi, M.I. IoT solution for AI-enabled PRIVACY-PREServing with big data transferring: An application for healthcare using blockchain. Energies 2021, 14, 5364. [Google Scholar] [CrossRef]
- Ramachandra, M.N.; Rao, M.S.; Lai, W.C.; Parameshachari, B.D.; Babu, J.A.; Hemalatha, K.L. An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard. Big Data Cogn. Comput. 2022, 6, 101. [Google Scholar] [CrossRef]
- Gehlot, A.; Misra, N. Privacy and Security Enabling for Healthcare Data using Lightweight Deep learning with Cryptography. In Proceedings of the 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), Mysuru, India, 16–17 October 2022; pp. 1–6. [Google Scholar]
- Thantilage, R.D.; Le-Khac, N.A.; Kechadi, M.T. Healthcare data security and privacy in Data Warehouse architectures. Inform. Med. Unlocked 2023, 39, 101270. [Google Scholar] [CrossRef]
- Refaee, E.; Parveen, S.; Begum, K.M.J.; Parveen, F.; Raja, M.C.; Gupta, S.K.; Krishnan, S. Secure and scalable healthcare data transmission in IoT based on optimized routing protocols for mobile computing applications. Wirel. Commun. Mob. Comput. 2022, 2022, 5665408. [Google Scholar] [CrossRef]
- Lejun, Z.; Minghui, P.; Shen, S.; Weizheng, W.; Zilong, J.; Yansen, S.; Huiling, C.; Ran, G.; Gataullin, S. Redundant data detection and deletion to meet privacy protection requirements in blockchain-based edge computing environment. China Commun. 2024, 21, 149–159. [Google Scholar] [CrossRef]
- Şenel, F.A.; Gökçe, F.; Yüksel, A.S.; Yiğit, T. A novel hybrid PSO–GWO algorithm for optimization problems. Eng. Comput. 2018, 35, 1359–1373. [Google Scholar] [CrossRef]
- Zolghadr-Asli, B.; Bozorg-Haddad, O.; Chu, X. Crow Search Algorithm (CSA). In Advanced Optimization by Nature-Inspired Algorithms. Studies in Computational Intelligence; Bozorg-Haddad, O., Ed.; Springer: Singapore, 2018; Volume 720. [Google Scholar]
- Alphonsa, M.M.A.; Amudhavalli, P. Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector. Evol. Intell. 2018, 11, 101–116. [Google Scholar] [CrossRef]
- Kavitha, C.; Anita, X. Task failure resilience technique for improving the performance of MapReduce in Hadoop. Etri J. 2020, 42, 748–760. [Google Scholar]
- Kavitha, C.; Srividhya, S.R.; Lai, W.-C.; Mani, V. IMapC: Inner MAPping Combiner to Enhance the Performance of MapReduce in Hadoop. Electronics 2022, 11, 1599. [Google Scholar] [CrossRef]
- Pu, Y.; Rong, Y.; Chen, J.; Mao, Y. Accelerated identification algorithms for exponential nonlinear models: Two-stage method and particle swarm optimization method. Circuits Syst. Signal Process. 2022, 41, 2636–2652. [Google Scholar] [CrossRef]
- Reegan, A.S.; Kabila, V. Highly secured cluster based WSN using novel FCM and enhanced ECC-ElGamal encryption in IoT. Wirel. Pers. Commun. 2021, 118, 1313–1329. [Google Scholar] [CrossRef]
- Thulasimani, L.; Hyils Sharon Magdalene, A. Lessening Spectrum Sensing Data Falsification Attack by Weighted Fuzzy Clustering Means Using Simulation Annealing in Cognitive Radio Networks. In International Conference on Advances in Electrical and Computer Technologies; Springer Nature: Singapore, 2021; pp. 423–435. [Google Scholar]
Number of Clusters | Time (s) | Memory (KB) |
---|---|---|
1 | 31.569 | 1520 |
2 | 30.638 | 1613 |
4 | 30.456 | 1663 |
Number of Clusters | Time (s) | Memory (KB) |
---|---|---|
1 | 29.55 | 1325 |
2 | 27.55 | 1265 |
4 | 26.45 | 1232 |
Number of Clusters | Time (s) | Memory (KB) |
---|---|---|
1 | 22.37 | 1216 |
2 | 24.45 | 1216 |
4 | 25.64 | 1199 |
Performance Metrics | Proposed vs. Previous Approaches | |
---|---|---|
Sanitization Method | SecPri-BGMPOP | |
Information loss | 0.07% | 0.024% |
Throughput | 3.5 Mbps | 7 Mbps |
3.625 Mbps | 7.16 Mbps | |
Encryption time | 0.11 s | 0.0086 s |
Decryption time | 0.054 s | 0.315 s |
Efficiency | 46.87 s | 58.130 s |
HFHBLO | PSO | GWO | Attack |
---|---|---|---|
Better than | 0.26% | 0.23% | CCA |
Superior to | 0.40% | 0.29% | CPA |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kuttiyappan, M.; Appadurai, J.P.; Kavin, B.P.; Selvaraj, J.; Gan, H.-S.; Lai, W.-C. Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment. Mathematics 2024, 12, 1969. https://doi.org/10.3390/math12131969
Kuttiyappan M, Appadurai JP, Kavin BP, Selvaraj J, Gan H-S, Lai W-C. Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment. Mathematics. 2024; 12(13):1969. https://doi.org/10.3390/math12131969
Chicago/Turabian StyleKuttiyappan, Moorthi, Jothi Prabha Appadurai, Balasubramanian Prabhu Kavin, Jeeva Selvaraj, Hong-Seng Gan, and Wen-Cheng Lai. 2024. "Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment" Mathematics 12, no. 13: 1969. https://doi.org/10.3390/math12131969
APA StyleKuttiyappan, M., Appadurai, J. P., Kavin, B. P., Selvaraj, J., Gan, H. -S., & Lai, W. -C. (2024). Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment. Mathematics, 12(13), 1969. https://doi.org/10.3390/math12131969