Advertisement

A Survey on Privacy Preserving Approaches on Health Care Big Data in Cloud

  • Lipsa Nayak
  • V. JayalakshmiEmail author
Conference paper
  • 43 Downloads
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 49)

Abstract

To reform and enhance healthcare services, the use of information technology is increasing in an unprecedented manner. This technological advancement results in generating substantial medical data from various Healthcare related things. This Medical Big data has a maximum prospective to upgrade patients’ treatment and follow up. We anticipate to flare-up some preventable infections, and we can significantly reduce the Healthcare delivery cost, by using the Medical Big data. One specific pattern observed in the medical services industry is serial shifting data to the cloud. By shifting data to the cloud, the accessibility of the patient’s medical history in real-time is possible and it can reduce costs. Though we enjoy multiple advantages of cloud computing for Medical Big data, we face specific security issues of our data stored in the cloud. In this paper, a brief analysis on various approaches used to protect the healthcare related information stored in the cloud and further they are secured using cryptographic techniques.

Keywords

Healthcare Cloud Security Medical Big data 

References

  1. 1.
    Li, Z.-R., et al.: A secure electronic medical record sharing mechanism in the cloud computing platform. In: 2011 IEEE 15th International Symposium on Consumer Electronics (2011)Google Scholar
  2. 2.
    Liu, W., Liu, X., Liu, J., Wu, Q., Zhang, J., Li, Y.: Auditing and revocation enabled role-based access control over outsourced private EHRs. In: 2015 IEEE 17th International Conference on High-Performance Computing and Communications (HPCC), New York, NY, USA, pp. 336–341 (2015)Google Scholar
  3. 3.
    Bhateja, R., et al.: Enhanced timing enabled proxy re-encryption model for e-health data in the public cloud. In: 2017 IEEE International Conference on Advances in Computing, Communications, and Informatics (ICACCI) (2017)Google Scholar
  4. 4.
    Attrapadung, N., Furukawa, J., Imai, H.: Forward-secure and searchable broadcast encryption with short ciphertexts and private keys. ASIACRYPT 2006, LNCS 4284, pp. 161–177. Springer, Heidelberg (2006)Google Scholar
  5. 5.
    Gowda, B.K., Sumathi, R.: Hierarchy attribute-based encryption with timing enabled privacy preserving keyword search mechanism for e-health clouds. In: 2017 2nd IEEE International Conference on Recent Trends in Electronics Information & Communication Technology (RTEICT), India, 19–20 May 2017 (2017)Google Scholar
  6. 6.
    Jayalakshmi, V., Nayak, L.: Protecting medical big data in a healthcare cloud using elliptic curve cryptography. J. Adv. Res. Dyn. Control Syst. 10(11-Special Issue), 1054–1059 (2018)Google Scholar
  7. 7.
    Liu, X., Deng, R.H., Choo, K.R., Yang, Y.: Privacy-preserving outsourced clinical decision support system in the cloud. IEEE Trans. Serv. Comput. (2017).  https://doi.org/10.1109/tsc.2017.2773604
  8. 8.
    Li, P., Guo, S., Miyazaki, T., Xie, M., Hu, J., Zhuang, W.: Privacy-preserving access to big data in the cloud. IEEE Cloud Comput. 3(5), 34–42 (2016)CrossRefGoogle Scholar
  9. 9.
    Al Hamid, H.A., et al.: A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography, pp. 2169–3536. IEEE (2017)Google Scholar
  10. 10.
    Karthiban, M.K., Raj, J.S.: Bıg data analytics for developing secure internet of everything. J. ISMAC 1(02), 129–136 (2019)Google Scholar
  11. 11.
    Rabieh, K., Akkaya, K., Karabiyik, U., Qamruddin, J.: A secure and cloud-based medical records access scheme for on-road emergencies. In: 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC) (2018)Google Scholar
  12. 12.
    Yang, Y.: Attribute-based data retrieval with semantic keyword search for e-health cloud. J. Cloud Comput. 4(1), 10 (2015)CrossRefGoogle Scholar
  13. 13.
    Chen, Y.Y., Lu, J.C., Jan, J.K.: A secure EHR system based on hybrid clouds. J. Med. Syst. 36(5), 3375–3384 (2012).  https://doi.org/10.1007/s10916-012-9830-6CrossRefGoogle Scholar
  14. 14.
    Valanarasu, M.R.: Smart and secure Iot and AI integration framework for hospital environment. J. ISMAC 1(03), 172–179 (2019)CrossRefGoogle Scholar
  15. 15.
    Abbas, A., Khan, S.U.: A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J. Biomed. Heal. Inf. 18(4), 1431–1441 (2014)CrossRefGoogle Scholar
  16. 16.
    Yang, Y., Ma, M.: Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans. Inf. Forensics Secur. 11(4), 746–759 (2016)Google Scholar
  17. 17.
    Kuo, M.H.: Opportunities and challenges of cloud computing to improve health care services. J Med Internet Research 13(3), e67 (2011)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.School of Computing SciencesVels Institute of Science, Technology and Advanced Studies (VISTAS)ChennaiIndia

Personalised recommendations