Survey in Finding the Best Algorithm for Data Analysis of Privacy Preservation in Healthcare

  • D. EvangelinEmail author
  • R. Venkatesan
  • K. Ramalakshmi
  • S. Cornelia
  • J. Padmhavathi
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 35)


Security for the patient’s information can be achieved by using different encryption algorithms. This paper reviews several encryption methods to gain knowledge about the possible attacks during managing and transmitting the sensitive data. The algorithms are compared to analyze and develop an appropriate encryption algorithm that provides security and integrity to the medical health records, thus the patient’s information remain confidential.




  1. 1.
    Cornelia, S., Venkatesan, R., Ramalakshmi, K., Evangelin, D., Padmhavathi, J.: Data analytics in privacy preservation in hospital- health care database management, Department of Computer Science Engineering, Karunya Institute of Technology, CoimbatoreGoogle Scholar
  2. 2.
    Princy, B.A., Tamilselvi, G., Shruthakeerthi, S., Sowmya, B.: Privacy preserving data analysis in mental health research using cloud computation, Department of Information Technology Panimalar Engineering College Chennai, Simon Fraser University, BurnabyGoogle Scholar
  3. 3.
    Sahi, M.A., Abbas, H., Saleem, K., Yang, X., Derhab, A., Orgun, M.A., Iqbal, W., Rashid, I., Yaseen, A.: Privacy preservation in e-healthcare environments: state of the art and future directionGoogle Scholar
  4. 4.
    Box, D., Pottas, D.: A model for information security compliant behaviour in the healthcare context, a School of ICT, Department of IT, Nelson Mandela Metropolitan University, Port, Elizabeth, 6001, South AfricaGoogle Scholar
  5. 5.
    Selvaraj, B., Periyasamy, S.: A review of recent advances in privacy preservation in health care data publishingGoogle Scholar
  6. 6.
    Lawand, V., Sargar, P., Bhalerao, A., Jadhav, P.: Analytical approach for privacy preserving of medical data, SIT, Lawale Department of Computer Engineering, Pune, IndiaGoogle Scholar
  7. 7.
    Adam, N., White, T., Shafiq, B., Vaidya, J., He, X.: Privacy preserving integration of health care data. In: Chen, R. (ed.) Concordia University, MontrealGoogle Scholar
  8. 8.
    Domadiya, N., Pratap, U.: Privacy-preserving association rule mining for horizontally partitioned healthcare data: a case study on the heart diseases, Sardar Vallabhbhai National Institute of Technology, Surat 395007Google Scholar
  9. 9.
    Bennett, K., Bennett, A.J., Griffiths, K.M.: Security considerations for e-mental health interventions, Reviewed by Tormod Rimehaug, Ioannis Mavridis, and Eva SkipenesGoogle Scholar
  10. 10.
    Benjamin, C.M., Fung, B.C.M., Wang, K.: Privacy-Preserving Data Publishing: A Survey of Recent Developments, Concordia University, Montreal Simon Fraser University, BurnabyGoogle Scholar
  11. 11.
    Venkatesan, R., Solomi, M.B.R.: Analysis of load balancing techniques in grid. In: Communications in Computer and Information Science CCIS, pp. 147–250 (2011)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • D. Evangelin
    • 1
    Email author
  • R. Venkatesan
    • 1
  • K. Ramalakshmi
    • 1
  • S. Cornelia
    • 1
  • J. Padmhavathi
    • 1
  1. 1.Department of Computer Science EngineeringKarunya Institute of Technology and SciencesCoimbatoreIndia

Personalised recommendations