Skip to main content

A New Medical Image Processing Approach for the Security of Cloud Services

  • Conference paper
  • First Online:
Lecture Notes in Real-Time Intelligent Systems (RTIS 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 756))

Included in the following conference series:

  • 651 Accesses

Abstract

Implementing cloud computing in medical fields would undoubtedly help achieving the best health outcomes. Obviously, this model simultaneously improves the quality of clinical decisions through advanced IT services, and lowers operating expenses. Indeed, cloud services are usually characterized by remarkable features such as cost-efficient, availability and easy exploitation. In particular, image processing using cloud has presently gained an expanding interest. Since cloud is an evolving technology, the usage of this new paradigm in such a sensitive domain requires filling the potential gaps related particularly to data privacy and security. In order to maintain data privacy, several security measures, which are based on different techniques and countermeasures, are developed, especially Service-Oriented Architecture (SOA), Secure Multi-party Computation (SMC), homomorphic cryptosystems and Secret Share Scheme (SSS). Although these existing methods are generally a promising approach, applying them to process medical data has negative effects on performance and privacy. In fact, they are inadequate to deal with a very high volume data effectively because they are originally designed for individual pixel values and text data. The main contribution of this paper is to provide a novel solution based on three-level architecture and clustering technique to secure Software-as-a-Service (SaaS) model. In this case, we use K-means clustering method to break up the secret image into a fixed number of regions, thereby processing each portion in a distinct node. This approach is meant to eliminate or reduce the risk of the potential disclosure of sensitive data. Further, we use a trusted component acting as an interface between consumers and cloud providers for minimizing security risks and cloud security threats. Specifically, this architecture is a highly efficient solution to mitigate anonymity and unlinkability issues in cloud environment. Simulation results have demonstrated the utility of the proposed methodology in ensuring the safety of medical data when using cloud services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing. Technical report, National Institute of Standards and Technology, vol. 15, pp. 1–3 (2009)

    Google Scholar 

  2. Mazhar, A., Samee, U.K., Athanasios, V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)

    Google Scholar 

  3. Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Inácio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113–170 (2013)

    Article  Google Scholar 

  4. Marwan, M., Kartit, A., Ouahmane, H.: Cloud-based medical image issues. Int. J. Appl. Eng. Res. 11, 3713–3719 (2016)

    Google Scholar 

  5. Petcu, D.: Portability and interoperability between clouds: challenges and case study. In: Abramowicz, W., Llorente, I.M., Surridge, M., Zisman, A., Vayssière, J. (eds.) ServiceWave 2011. LNCS, vol. 6994, pp. 62–74. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  6. Ahuja, S.P., Maniand, S., Zambrano, J.: A survey of the state of cloud computing in healthcare. Netw. Commun. Technol. 1(2), 12–19 (2012)

    Google Scholar 

  7. Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science (CLOUDCOM), pp. 693–702. IEEE Computer Society, Washington, DC (2010)

    Google Scholar 

  8. Al Nuaimi, N., AlShamsi, A., Mohamed, N., Al-Jaroodi, J.: E-health cloud implementation issues and efforts. In: Proceedings of the International Conference on industrial Engineering and Operations Management (IEOM), pp. 1–10 (2015)

    Google Scholar 

  9. Todica, V., Vaida, M.F.: SOA-based medical image processing platform. In: Proceedings of the of IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), pp. 398–403 (2008). https://doi.org/10.1109/AQTR.2008.4588775

  10. Chiang, W., Lin, H., Wu, T., Chen, C.: Building a cloud service for medical image processing based on service-orient architecture. In: Proceedings of the 4th International Conference on Biomedical Engineering and Informatics (BMEI), pp. 1459–1465 (2011). https://doi.org/10.1109/BMEI.2011.6098638

  11. Moulick, H.N., Ghosh, M.: Medical image processing using a service oriented architecture and distributed environment. Am. J. Eng. Res. (AJER) 02(10), 52–62 (2013)

    Google Scholar 

  12. Challa, R.K., Kakinada, J., Vijaya Kumari, G., Sunny, B.: Secure image processing using LWE based homomorphic encryption. In: Proceedings of the IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–6 (2015)

    Google Scholar 

  13. Gomathisankaran, M., Yuan, X., Kamongi, P.: Ensure privacy and security in the process of medical image analysis. In: Proceedings of the IEEE International Conference on Granular Computing (GrC), pp. 120–125 (2013)

    Google Scholar 

  14. Mohanty, M., Atrey, P.K., Ooi, W.-T.: Secure cloud-based medical data visualization. In: Proceedings of the ACM Conference on Multimedia (ACMMM 2012), Japan, pp. 1105–1108 (2012)

    Google Scholar 

  15. Lathey, A., Atrey, P.K.: Image enhancement in encrypted domain over cloud. ACM Tran. Multimed. Comput. Commun. 11(3), 38 (2015). https://doi.org/10.1145/2656205

    Article  Google Scholar 

  16. Mohanty, M., Ooi, W.T., Atrey, P.K.: Secure cloud-based volume ray-casting. In: Proceedings of the International Conference on Cloud Computing Technology and Services (CloudCom 2013), pp. 531–538. IEEE (2013). https://doi.org/10.1109/CloudCom.2013.77

  17. Hu, N., Cheung, S.C.: Secure image filtering. In: Proceedings of the of IEEE International Conference on Image Processing (ICIP 2006), pp. 1553–1556 (2006)

    Google Scholar 

  18. Avidan, S., Butman, M.: Blind Vision. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) Computer Vision – ECCV 2006. LNCS, vol. 3953, pp. 1–13 (2006). Springer, Heidelberg (2006). https://doi.org/10.1007/11744078_1

    Google Scholar 

  19. Dhanachandra, N., Manglem, K., Chanu, Y.J.: Image segmentation using K-means clustering algorithm and subtractive clustering algorithm. Proc. Comput. Sci., 764–771 (2015). https://doi.org/10.1016/j.procs.2015.06.090

    Article  Google Scholar 

  20. Abdul-Nasir, A.S., Mashor, M.Y., Mohamed, Z.: Colour image segmentation approach for detection of malaria parasiter using various colour models and K-means clustering. J. WSEAS Trans. Biology Biomed. 10(1), 41–55 (2013)

    Google Scholar 

  21. Gulhane, A., Paikrao, P.L., Chaudhari, D.S.: A review of image data clustering techniques. Int. J. Soft Comput. Eng. 2(1), 212–215 (2012)

    Google Scholar 

  22. Oliva, G., Setola, R., Hadjicostis, C.: Distributed K-means. Submitted to IEEE Transactions on Mobile Computing. http://arxiv.org/abs/1312.4176

  23. Mao, Y., Xu, Z., Li, X., Ping, P.: An optimal distributed K-Means clustering algorithm based on cloudstack. In: Proceedings of the IEEE International Conference on Information and Automation, China, pp. 3149–3156 (2015). https://doi.org/10.1109/ICInfA.2015.7279830

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mbarek Marwan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Marwan, M., Kartit, A., Ouahmane, H. (2019). A New Medical Image Processing Approach for the Security of Cloud Services. In: Mizera-Pietraszko, J., Pichappan, P., Mohamed, L. (eds) Lecture Notes in Real-Time Intelligent Systems. RTIS 2017. Advances in Intelligent Systems and Computing, vol 756. Springer, Cham. https://doi.org/10.1007/978-3-319-91337-7_34

Download citation

Publish with us

Policies and ethics