Advertisement

Big Data Issues in Medical Healthcare

  • Manish Madhava Tripathi
  • N. K. Joshi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 624)

Abstract

Due to rapid growth of digitization process, big data size is increasing day by day. In healthcare system, electronic patient data is maintained in hospitals for years of years. As medical data contain patient information, its size and sensitivity increases. These medical data can be accessed after long time as per need of the patient, and therefore the data must be secure for long time as well as can be accessed with ease and speed. In this paper, we have discussed some of the challenges due to rapid growth of digital data and have tried to give solution for it. Further we have given a mechanism to distinguish between useful and waste data.

Keywords

Big data Security Data mining Healthcare Medical data 

References

  1. 1.
    J. Manyika et al., “Big data: The Next Frontier for Innovation, Competition, and Productivity”, Zürich, Switzerland: McKinsey Global Inst., Jun. 2011, pp. 1–137.Google Scholar
  2. 2.
    B. Matturdi, X. Zhou, S. Li, and F. Lin, “Big data security and privacy: A review,” China Commun., vol. 11, no. 14, pp. 135–145, Apr. 2014.Google Scholar
  3. 3.
    J. Gantz and D. Reinsel, “Extracting value from chaos,” in Proc. IDC IView, Jun. 2011, pp. 1–12.Google Scholar
  4. 4.
    A. Katal, M. Wazid, and R. H. Goudar, “Big data: Issues, challenges, tools and good practices,’’ in Proc. IEEE Int. Conf. Contemp. Comput., Aug. 2013, pp. 404–409.Google Scholar
  5. 5.
    J. Adler-Milstein, A.K. Jha, Healthcares “Big Data” challenge, Am. J. Manag. Care 19 (7) (2013) 537–538.Google Scholar
  6. 6.
    F. Cismondia, A.S. Fialho, S.M. Vieira, S.R. Reti, J.M.C. Sousa, S.N. Finkelstein, Missing data in medical databases: impute, delete or classify?, Artif. Intell. Med. 58 (2013) 63–72.Google Scholar
  7. 7.
    Manish Madhava Tripathi, Abhishek Ranjan, “Medical Image watermarking for Mobile Smart phones”, International Journal for Innovations in Engineering, Science and Management, Volume 2, Issue 11, November 2014.Google Scholar
  8. 8.
    N.O. Skaga, T. Eken, J.M. Jones, P.A. Steen, Different definitions of patient outcome: consequences for performance analysis in trauma, Injury 39 (5)(2008) 612–622.Google Scholar
  9. 9.
    Manish Madhava Tripathi, Dr S P Tripathi, “ Image Encryption Techniques: A Critical Comparison”, International Journal of Computer Science Engineering and Information Technology Research, Vol 3, issue 1, March 13.Google Scholar
  10. 10.
    Manish Madhava Tripathi, Md Saif, “HMM Based Offline Signature Forgery Detection”, International Journal of Engineering Technology and Computer Research (IJETCR), ISSN: 2348 – 2117, Volume 3; Issue 2; Page No. 41–47.Google Scholar
  11. 11.
    Mohammad Haroon, Mohd Husain, “Interest Attentive Dynamic Load Balancing in distributed systems”, Publication date 2015/3/11, Publisher IEEE.Google Scholar
  12. 12.
    Mohd Haroon Ashwani Singh, Mohd Arif, “Routing Misbehaviour In Mobile Ad Hoc Network”, IJEMR, Volume 4, Issue 5, October 2014.Google Scholar
  13. 13.
    Mohd Haroon, Mohd Husain, Manish Madhav Tripathi, Tameem Ahmad, Vandana Kumari, “Server Controlled Mobile Agent”, International Journal of Computer Applications (0975–8887), Volume 11, Issue 4 Pages 13–16.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Integral UniversityLucknowIndia
  2. 2.Uttaranchal UniversityDehradunIndia

Personalised recommendations