Skip to main content

Cost Based Model for Secure Health Care Data Retrieval

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 969))

Abstract

In healthcare application, a huge amount of sensitive data is generated continuously which requires an efficient mechanism to retrieve them such that sensitive information is not leaked to unauthorized users. In this paper, we introduce a data retrieval strategy in linearly scalable high-performance NoSQL database like Cassandra and present a security analysis while retrieving the stored data. E-Health data is fragmented over multiple servers based on sensitive attributes and their sensitive association. It is required to make an extra layer of protection on actual data by representing it to users as chunks by introducing metadata concept. However, data retrieval requires authentication of users and the queries put forth by the user, for which a proper costing mechanism involving both user and query is introduced in this work using linear optimization concept.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Hasan, R., Myagmar, S., Lee, A.J., Yurcik, W.: Toward a threat model for storage systems. In: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability Storage SS05, pp. 94–102. ACM, New York (2005)

    Google Scholar 

  2. Mushtaque, A.: Comparative analysis on different parameters of encryption algorithms for information security. IJCSE 2(4), 2347–2693 (2014)

    Google Scholar 

  3. Reassessing Your Security Practices in a Health IT Environment: A Guide for Small Health Care Practices

    Google Scholar 

  4. Weng, L., Amsaleg, L., Morton, A., Maillet, S.: A privacy-preserving framework for large-scale content-based information retrieval. IEEE Trans. Inf. Forensics Secur. 10(1), 152–167 (2015)

    Article  Google Scholar 

  5. Saha, S., Neogy, S.: Case study on a smart surveillance system using WSN and IP webcam. In: IEEE Xplore International Conference on Applications and Innovations in Mobile Computing (AIMoC 2014), pp. 36–41 (2014)

    Google Scholar 

  6. Koutris, P., Upadhyaya, P., Balazinska, M., Howe, B., Suciu, D.: Query-Based Data Pricing, PODS 12, Scottsdale, Arizona, USA (2012)

    Google Scholar 

  7. Wang, H., Lakshmanan, L.V.: Efficient secure query evaluation over encrypted XML databases. In: Proceedings of the 32nd International Conference on Very Large Databases, pp. 127–138. VLDB Endowment (2006)

    Google Scholar 

  8. Segoufin, L., Vianu, V.: Views and queries: determinacy and rewriting. In: Proceedings of the Twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 49–60. ACM, New York (2005)

    Google Scholar 

  9. Saha, S., Saha, P., Neogy, S.: Hierarchical metadata-based secure data retrieval technique for healthcare application. In: Choudhary, R.K., Mandal, J.K., Bhattacharyya, D. (eds.) Advanced Computing and Communication Technologies. AISC, vol. 562, pp. 175–182. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-4603-2_17

    Chapter  Google Scholar 

  10. Saha, S., Parbat, T., Neogy, S.: Designing a secure data retrieval strategy using NoSQL database. In: Krishnan, P., Radha Krishna, P., Parida, L. (eds.) ICDCIT 2017. LNCS, vol. 10109, pp. 235–238. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-50472-8_20

    Chapter  Google Scholar 

  11. Chowdhury, C., Neogy, S.: Checkpointing using mobile agents for mobile computing system. Int. J. Recent Trends Eng. 1(2), 26–29 (2009)

    Google Scholar 

  12. Biswas, S., Neogy, S.: Checkpointing and recovery using node mobility among clusters in mobile ad hoc network. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) Advances in Computing and Information Technology. AISC, vol. 176, pp. 447–456. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31513-8_46

    Chapter  Google Scholar 

  13. Chowdhury, C., Neogy, S.: A consistent checkpointing-recovery protocol for minimal number of nodes in mobile computing system. In: Aluru, S., Parashar, M., Badrinath, R., Prasanna, V.K. (eds.) HiPC 2007. LNCS, vol. 4873, pp. 599–611. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77220-0_54

    Chapter  Google Scholar 

  14. Chowdhury, C., Neogy, S.: Securing mobile agents in MANET against attacks using trust. Int. J. Netw. Secur. Appl. (IJNSA) 3(6), 259–274 (2011)

    Google Scholar 

  15. Cassandra. http://cassandra.apache.org/

Download references

Acknowledgement

The authors like to acknowledge Department of Computer Science & Engineering, Jadavpur University and Information Technology Research Academy (ITRA), GoI, ITRA-Mobile grant ITRA/15(59)/Mobile/RemoteHealth/01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarmistha Neogy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumari, K., Saha, S., Neogy, S. (2019). Cost Based Model for Secure Health Care Data Retrieval. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5826-5_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5825-8

  • Online ISBN: 978-981-13-5826-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics