A Survey on Securing and Optimizing Health Care Bigdata

  • Authors

    • K. Kavitha
    • D. Anuradha
    • P. Pandian
    2018-10-02
    https://doi.org/10.14419/ijet.v7i4.10.21212
  • Big-data, Healthcare, Information security, Optimization, Multi-objective optimization, Simulation.
  • Huge amount of health care data are available online to improve the overall performance of health care system. Since this huge health care Big-data is valuable and sensitive, it requires safety. In this paper we analyze numerous ways in which the health care Big-data can be protected. In recent days many augmented security algorithm that are suitable for Big-data have emerged like, El-Gamal, Triple-DES, and Homomorphic algorithms. Also authentication and access control can be implemented over Big-data using Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) schemes.

    Along with security to Big-data we try to evolve the ways in which the valuable Big-data can be optimized to improve the Big-data analysis. Mathematical optimization techniques such as simple and multi-purpose optimization and simulation are employed in Big-data to maximize the patient satisfaction and usage of doctor’s consulting facility. And also, to minimize the cost spent by patient and energy wasted.

     

     

  • References

    1. [1] AlexandruSoceanu, AlexandruEgner, TraianMuntean (2015), Managing the Privacy and Security of eHealth Data. 20th International Conference on Control Systems and Science, 978-1-4799-1780-8/15 $31.00 © IEEE.

      [2] AmineRahmani, Abdelmalek Amine and Mohamed Reda Hamou (2015), A mathematical model of access control in big data using confidence interval and digital signature. Computer Science and Information Technology, 183-198.

      [3] Arthur C (2011), PlayStation Network: hackers claim to have 2.2m credit cards. The Guardian Technology Blog. http://www.guardian.co.uk/technology/blog/2011/apr/29/playstationnetwork-hackers-credit-cards.

      [4] Balana, open source XACML 3.0 implementation http://xacmlinfo.org/category/balana.

      [5] Brosette SE, Spragre AP, Jones WT, Moser SA (2000),A data mining system for infection control surveillance. Methods Inf Med, 303-310.

      [6] DananThilakanathan, Yu Zhao, Shiping Chen, Surya Nepal, Rafael CalvoandAbelardo Pardo A (2014), Protecting and Analysing Health Care Data on Cloud“,978-1-4799-8085-7/14 $31.00 ©IEEE

      [7] Dolski S, Huonder F and Oberholzer S (2007), HERAS-AF: XACML 2.0 Implementation, Technical Report, University of Applied Sciences Rapperswil.

      [8] Enterprise-Java-XACML, http://code.google.com/p/enterprise-javaxacml

      [9] Hagner M (2007), Security infrastructure and national patent summary. In Tromso Telemedicine and eHealth Conference.

      [10] Halamka JD (2015), Using Big Data to Make Wiser Medical Decisions, Harvard Business Review,[Online]. Available: https://hbr.org/2015/12/using-big-data-to-makewiser-medical-decisions.

      [11] Hamid Reza Feili (2013), Improving the health care systems performance by simulation optimization. Journal of Mathematics and Computer Science, 7. 73-79.

      [12] Healthcare costs rise to $130bn, or $5800 per Australian: report. http://www.news.com.au/lifestyle/health/health-spending-reaches-130b-report/story-fneuz9ev-1226481443042

      [13] Indiana Health Information Exchange (2016), http://www.ihie.org

      [14] Kaluvuri S, Egner A, Hartog J and Zannone N (2015), SAFAX – An Extensible Authorization Service for Cloud Environments, Frontiers in Computer and Network Security.

      [15] Karvelas P (2014), Australias mental health system must become more efficient. The Australian. Source: http://www.theaustralian.com.au/nationalaffairs/policy/australiasmental-health-system-must-become-more-efficient/story-fn59nokw-1226850819260.

      [16] Ko SY, Jeon K, Morales R (2011), The HybrEx model for confidentiality and privacy in cloud computing. In: 3rd USENIX workshop on hot topics in cloud computing, HotCloud’11, Portland.

      [17] KupwadePatil H and Seshadri R (2014), Big Data Security and Privacy Issues in Healthcare, IEEE International Congress on Big Data, 762–765.

      [18] Laila En-nahli, Hamid Allaoui and IssamNouaouri (2015), A multi-objective modelling to human resource assignment and routing problem for home health care services. Science Direct, 698-703.

      [19] Liu A, Chen F, Hwang J and Xie T (2011), Designing fast and scalable XACML policy evaluation engines. IEEE Trans. Computers, 60(12) 1802-1817.

      [20] Liu S (2013), Exploring the Future of Computing. IT Professional, vol. 15(1), 2–3.

      [21] Marr B (2015), How Big Data Is Changing Healthcare. Forbes, [Online]. Available: http://onforb.es/1bfRQ0b.

      [22] Mohan A, Blough DM (2010), An Attribute-Based Authorization Policy Framework with Dynamic Conflict Resolution. Proceedings of the 9th Symposium on Identity and Trust on the Internet.

      [23] Patrizio A (2007), Salesforce.com Scrambles To Halt Phishing Attacks. Internet News.com. http://www.internetnews.com/ent-news/article.php.

      [24] Priyank J, Manasi G and Nilay K (2016), Big data privacy: a technological perspective and review. In Journal of Big Data.

      [25] RuiZhangand Ling Liu (2010), Security Models and Requirements for Healthcare Application Clouds. IEEE 3rd International Conference on Cloud Computing.,

      [26] Samanthula BK, Elmehdwi Y and Jiang W (2015), K-nearest neighbour classification over semantically secure encrypted relational data. IEEE Transactions on Knowledge and Data Engineering, vol. 27(5), 1261–1273.

      [27] Sathya S, Sethukarasi T (2016), Efficient privacy preservation technique for healthcare records using big data. International Conference On Information Communication And Embedded System (ICICES) 978-1-5090-2552-7.

      [28] Science Applications International Corporation (2004) (SAIC). Role-Based Access Control (RBAC) Role Engineering Process Version 3.0.

      [29] Sun’sXCAMLImplementation,http://sunxacml.sourceforge.net/

      [30] Ulusoy H, Kantarcioglu M, Pattuk E and Kagal L (2015), Accountable MR: Toward accountable MapReduce systems. IEEE International Conference on Big Data, 451–460.

      [31] VassilikiKoufi, Flora Malamateniou and George Vassilacopoulos (2015), A big data driven model for the optimization of healthcare processes, European Federation for Medical Informatics, 697-701.

      [32] Vishnu S Basuthkar, ChetanaSrinivas (2016), A survey of cost effective big data in healthcare applications. International Journal of Computer Applications, 23-27.

      [33] Waqar A, Raza A, Abbas H and Khurram Khan M (2013), A framework for preservation of cloud users data privacy using dynamic reconstruction of metadata. Journal of Network and Computer Applications, vol. 36(1), 235–248.

  • Downloads

  • How to Cite

    Kavitha, K., Anuradha, D., & Pandian, P. (2018). A Survey on Securing and Optimizing Health Care Bigdata. International Journal of Engineering & Technology, 7(4.10), 504-507. https://doi.org/10.14419/ijet.v7i4.10.21212