Evolutionary Intelligence

, Volume 11, Issue 1–2, pp 101–116 | Cite as

Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector

  • M. M. Annie AlphonsaEmail author
  • P. Amudhavalli
Special Issue


Cloud computing is a computing paradigm that provides vibrant accessible infrastructure for data, application and file storage as well. This technology advancement benefits in a significant lessening of consumption cost, application hosting, content storage as well as delivery, and hence the concept appear gradually more in all entities that exploited in the healthcare sector. Under such circumstances, efficient analysis and data extraction from a cloud environment is more challenging. Moreover, the extracted data has to be preserved for privacy. To handle these challenges, this paper has come out with a privacy-preserving algorithm in both data sanitization and data restoration process. Further, several researchers have contributed advancement in the restoration process, yet the accuracy of restoration seems to be very low. As a solution to this problem, this paper uses a hybrid algorithm termed as genetically modified glowworm swarm for both data sanitization and data restoration process. Further, the developed hybridization model compares its performance with other conventional models like conventional glowworm swarm optimization, firefly, particle swarm optimization, artificial bee colony, crow search, group search optimization and genetic algorithm in terms of statistical analysis, sanitization and restoration effectiveness, convergence analysis and key sensitivity analysis, and the dominance of the developed model is proved.


Cloud computing Medical data Privacy preservation Data hiding Data restoration GMGW 



  1. 1.
    Sahi A, Lai D, Li Y (2016) Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Comput Biol Med 78:1–8CrossRefGoogle Scholar
  2. 2.
    Zhou J, Cao Z, Dong X, Lin X (2015) PPDM: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J Select Top Signal Process 9(7):1332–1344CrossRefGoogle Scholar
  3. 3.
    Gatzoulis L, Iakovidis I (2007) Wearable and portable ehealth systems. IEEE Eng Med Biol Mag 26(5):51–56CrossRefGoogle Scholar
  4. 4.
    Takabi H, Joshi JBD, Ahn GJ (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24–31CrossRefGoogle Scholar
  5. 5.
    Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gen Comput Syst 28(3):583–592CrossRefGoogle Scholar
  6. 6.
    Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud computing vulnerabilities. IEEE Secur Priv 9(2):50–57CrossRefGoogle Scholar
  7. 7.
    Zhang K, Liang X, Shen X, Lu R (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun Mag 52(3):58–65CrossRefGoogle Scholar
  8. 8.
    Liu X, Lu R, Ma J, Chen L, Qin B (2016) Privacy-preserving patient-centric clinical decision support system on naïve bayesian classification. IEEE J Biomed Health Inf 20(2):655–668CrossRefGoogle Scholar
  9. 9.
    Barua M, Liang X, Lu R, Shen X (2011) ESPAC: enabling security and patient-centric access control for ehealth in cloud computing. Int J Secur Netw 6(2–3):67–76Google Scholar
  10. 10.
    Viswanathan H, Chen B, Pompili D (2012) Research challenges in computation, communication, and context awareness for ubiquitous healthcare. IEEE Commun Mag 50(5):92–99CrossRefGoogle Scholar
  11. 11.
    Lee SH, Song JH, Kim IK (2016) CDA generation and integration for health information exchange based on cloud computing system. IEEE Trans Serv Comput 9(2):241–249CrossRefGoogle Scholar
  12. 12.
    Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542–555MathSciNetCrossRefGoogle Scholar
  13. 13.
    Azadeh A, Fam IM, Khoshnoud M, Nikafrouz M (2008) Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: the case of a gas refinery. Inf Sci 178(22):4280–4300,CrossRefGoogle Scholar
  14. 14.
    Zhang K, Liang X, Baura M, Lu R, (Sherman)Shen X (2014) PHDA: a priority based health data aggregation with privacy preservation for cloud assisted WBANs. Inf Sci 284:130–141MathSciNetGoogle Scholar
  15. 15.
    Wang W, Chen L, Zhang Q (2015) Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput Netw 88:136–148CrossRefGoogle Scholar
  16. 16.
    Iakovidis I (1998) Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare record in Europe. Int J Med Inf 52(1–3):105–115Google Scholar
  17. 17.
    Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRefGoogle Scholar
  18. 18.
    Li H, Xiong L, Ohno-Machado L, Jiang X (2014) Privacy preserving RBF kernel support vector machine. BioMed Res Int 2014:1–10Google Scholar
  19. 19.
    Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In: 2010 Proceedings IEEE INFOCOM, pp 1–9Google Scholar
  20. 20.
    Shi E, Chan T, Rieffel E, Chow R, Song D (2011) Privacy-preserving aggregation of time-series data. In: Proceedings of NDSSGoogle Scholar
  21. 21.
    Shi J, Zhang R, Liu Y, Zhang Y (2010) PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. In: 2010 Proceedings IEEE INFOCOM, San Diego, CA, pp 1–9Google Scholar
  22. 22.
    Kumar BSS, Manjunath AS, Christopher S (2018) Improved entropy encoding for high efficient video coding standard. Alexandria Eng J 57(1):1–9CrossRefGoogle Scholar
  23. 23.
    Kota PN, Gaikwad AN (2017) Optimized scrambling sequence to reduce papr in space frequency block codes based MIMO-OFDM system. J Adv Res Dyn Control Syst:502–525Google Scholar
  24. 24.
    Bhatnagar K, Gupta S (2017) Extending the neural model to study the impact of effective area of optical fiber on laser intensity. Int J Intell Eng Syst 10(4):274–283CrossRefGoogle Scholar
  25. 25.
    Balaji GN, Subashini TS, Chidambaram N (2015) Detection of heart muscle damage from automated analysis of echocardiogram video. IETE J Res 61(3):236–243CrossRefGoogle Scholar
  26. 26.
    Bramhe SS, Dalal A, Tajne D, Marotkar D (2015) Glass shaped antenna with defected ground structure for cognitive radio application. In: International conference on computing communication control and automation, Pune, pp 330–333Google Scholar
  27. 27.
    Waqar A, Raza A, Abbas H, Khan MK (2013) A framework for preservation of cloudusers’data privacy using dynamic reconstruction of metadata. J Netw Comput Appl 36:235–248CrossRefGoogle Scholar
  28. 28.
    Nallakumar MR, Sengottaiyan N, MohamedArif M (2014) Cloud computing and methods for privacy preservation: a survey. IJARCET 3(11)Google Scholar
  29. 29.
    Yarrapragada KSSR, Krishna BB Impact of tamanu oil-diesel blend on combustion, performance and emissions of diesel engine and its prediction methodology. J Braz Soc Mech Sci Eng:1–15Google Scholar
  30. 30.
    Sreedharan N, Preetha N, Ganesan B, Raveendran R, Sarala P, Dennis B, Rajakumar Boothalingam R (2018) Grey Wolf optimisation-based feature selection and classification for facial emotion recognition. IET BiometrGoogle Scholar
  31. 31.
    Sarkar A, Murugan TS (2017) Cluster head selection for energy efficient and delay-less routing in wireless sensor network. Wirel Netw:1–18Google Scholar
  32. 32.
    Wagh AM, Todmal SR (2015) Eyelids, eyelashes detection algorithm and hough transform method for noise removal in iris recognition. Int J Comput Appl 112(3):28–31Google Scholar
  33. 33.
    Iyapparaja M, Tiwari M (2017) Security policy speculation of user uploaded images on content sharing sites. IOP Conf Ser Mater Sci Eng 263(4):042019CrossRefGoogle Scholar
  34. 34.
    Chandramohan D, Vengattaraman T, Dhavachelvan P (2017) A secure data privacy preservation for on-demand cloud service. J King Saud Univ Eng Sci 29(2):144–150Google Scholar
  35. 35.
    Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145CrossRefGoogle Scholar
  36. 36.
    Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Rep 39:51–57Google Scholar
  37. 37.
    Wu B, Qian C, Ni W, Fan S (2012) The improvement of glowworm swarm optimization for continuous optimization problems. Expert Syst Appl 39(7):6335–6342CrossRefGoogle Scholar
  38. 38.
    McCall J (2005) Genetic algorithms for modelling and optimisation. J Comput Appl Math 184(1):205–222MathSciNetCrossRefGoogle Scholar
  39. 39.
    Karaboga D, Basturk B (2008) On the performance of artificial bee colony (ABC) algorithm. Appl Soft Comput 8(1):687–697CrossRefGoogle Scholar
  40. 40.
    Tanweer MR, Suresh S, Sundararajan N (2015) Self regulating particle swarm optimization algorithm. Inf Sci 294:182–202MathSciNetCrossRefGoogle Scholar
  41. 41.
    Fister I, Fister I Jr, Yang XS, Brest J (2013) A comprehensive review of firefly algorithms. Swarm Evolut Comput 13:34–46CrossRefGoogle Scholar
  42. 42.
    Gupta D, Sundaram S, Khanna A, Hassanien AE, de Albuquerque VHC (2018) Improved diagnosis of Parkinson’s disease using optimized crow search algorithm. Comput Electr Eng 68:412–424CrossRefGoogle Scholar
  43. 43.
    He S, Wu QH, Saunders JR (2009) Group search optimizer: an optimization algorithm inspired by animal searching behavior. IEEE Trans Evol Comput 13(5):973–990CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Computer Science and EngineeringKarpagam Academy of Higher EducationCoimbatoreIndia

Personalised recommendations