A Survey on Securing and Optimizing Health Care Bigdata
-
2018-10-02 https://doi.org/10.14419/ijet.v7i4.10.21212 -
Big-data, Healthcare, Information security, Optimization, Multi-objective optimization, Simulation. -
Abstract
Huge amount of health care data are available online to improve the overall performance of health care system. Since this huge health care Big-data is valuable and sensitive, it requires safety. In this paper we analyze numerous ways in which the health care Big-data can be protected. In recent days many augmented security algorithm that are suitable for Big-data have emerged like, El-Gamal, Triple-DES, and Homomorphic algorithms. Also authentication and access control can be implemented over Big-data using Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) schemes.
Along with security to Big-data we try to evolve the ways in which the valuable Big-data can be optimized to improve the Big-data analysis. Mathematical optimization techniques such as simple and multi-purpose optimization and simulation are employed in Big-data to maximize the patient satisfaction and usage of doctor’s consulting facility. And also, to minimize the cost spent by patient and energy wasted.
Â
Â
-
References
[1] AlexandruSoceanu, AlexandruEgner, TraianMuntean (2015), Managing the Privacy and Security of eHealth Data. 20th International Conference on Control Systems and Science, 978-1-4799-1780-8/15 $31.00 © IEEE.
[2] AmineRahmani, Abdelmalek Amine and Mohamed Reda Hamou (2015), A mathematical model of access control in big data using confidence interval and digital signature. Computer Science and Information Technology, 183-198.
[3] Arthur C (2011), PlayStation Network: hackers claim to have 2.2m credit cards. The Guardian Technology Blog. http://www.guardian.co.uk/technology/blog/2011/apr/29/playstationnetwork-hackers-credit-cards.
[4] Balana, open source XACML 3.0 implementation http://xacmlinfo.org/category/balana.
[5] Brosette SE, Spragre AP, Jones WT, Moser SA (2000),A data mining system for infection control surveillance. Methods Inf Med, 303-310.
[6] DananThilakanathan, Yu Zhao, Shiping Chen, Surya Nepal, Rafael CalvoandAbelardo Pardo A (2014), Protecting and Analysing Health Care Data on Cloud“,978-1-4799-8085-7/14 $31.00 ©IEEE
[7] Dolski S, Huonder F and Oberholzer S (2007), HERAS-AF: XACML 2.0 Implementation, Technical Report, University of Applied Sciences Rapperswil.
[8] Enterprise-Java-XACML, http://code.google.com/p/enterprise-javaxacml
[9] Hagner M (2007), Security infrastructure and national patent summary. In Tromso Telemedicine and eHealth Conference.
[10] Halamka JD (2015), Using Big Data to Make Wiser Medical Decisions, Harvard Business Review,[Online]. Available: https://hbr.org/2015/12/using-big-data-to-makewiser-medical-decisions.
[11] Hamid Reza Feili (2013), Improving the health care systems performance by simulation optimization. Journal of Mathematics and Computer Science, 7. 73-79.
[12] Healthcare costs rise to $130bn, or $5800 per Australian: report. http://www.news.com.au/lifestyle/health/health-spending-reaches-130b-report/story-fneuz9ev-1226481443042
[13] Indiana Health Information Exchange (2016), http://www.ihie.org
[14] Kaluvuri S, Egner A, Hartog J and Zannone N (2015), SAFAX – An Extensible Authorization Service for Cloud Environments, Frontiers in Computer and Network Security.
[15] Karvelas P (2014), Australias mental health system must become more efficient. The Australian. Source: http://www.theaustralian.com.au/nationalaffairs/policy/australiasmental-health-system-must-become-more-efficient/story-fn59nokw-1226850819260.
[16] Ko SY, Jeon K, Morales R (2011), The HybrEx model for confidentiality and privacy in cloud computing. In: 3rd USENIX workshop on hot topics in cloud computing, HotCloud’11, Portland.
[17] KupwadePatil H and Seshadri R (2014), Big Data Security and Privacy Issues in Healthcare, IEEE International Congress on Big Data, 762–765.
[18] Laila En-nahli, Hamid Allaoui and IssamNouaouri (2015), A multi-objective modelling to human resource assignment and routing problem for home health care services. Science Direct, 698-703.
[19] Liu A, Chen F, Hwang J and Xie T (2011), Designing fast and scalable XACML policy evaluation engines. IEEE Trans. Computers, 60(12) 1802-1817.
[20] Liu S (2013), Exploring the Future of Computing. IT Professional, vol. 15(1), 2–3.
[21] Marr B (2015), How Big Data Is Changing Healthcare. Forbes, [Online]. Available: http://onforb.es/1bfRQ0b.
[22] Mohan A, Blough DM (2010), An Attribute-Based Authorization Policy Framework with Dynamic Conflict Resolution. Proceedings of the 9th Symposium on Identity and Trust on the Internet.
[23] Patrizio A (2007), Salesforce.com Scrambles To Halt Phishing Attacks. Internet News.com. http://www.internetnews.com/ent-news/article.php.
[24] Priyank J, Manasi G and Nilay K (2016), Big data privacy: a technological perspective and review. In Journal of Big Data.
[25] RuiZhangand Ling Liu (2010), Security Models and Requirements for Healthcare Application Clouds. IEEE 3rd International Conference on Cloud Computing.,
[26] Samanthula BK, Elmehdwi Y and Jiang W (2015), K-nearest neighbour classification over semantically secure encrypted relational data. IEEE Transactions on Knowledge and Data Engineering, vol. 27(5), 1261–1273.
[27] Sathya S, Sethukarasi T (2016), Efficient privacy preservation technique for healthcare records using big data. International Conference On Information Communication And Embedded System (ICICES) 978-1-5090-2552-7.
[28] Science Applications International Corporation (2004) (SAIC). Role-Based Access Control (RBAC) Role Engineering Process Version 3.0.
[29] Sun’sXCAMLImplementation,http://sunxacml.sourceforge.net/
[30] Ulusoy H, Kantarcioglu M, Pattuk E and Kagal L (2015), Accountable MR: Toward accountable MapReduce systems. IEEE International Conference on Big Data, 451–460.
[31] VassilikiKoufi, Flora Malamateniou and George Vassilacopoulos (2015), A big data driven model for the optimization of healthcare processes, European Federation for Medical Informatics, 697-701.
[32] Vishnu S Basuthkar, ChetanaSrinivas (2016), A survey of cost effective big data in healthcare applications. International Journal of Computer Applications, 23-27.
[33] Waqar A, Raza A, Abbas H and Khurram Khan M (2013), A framework for preservation of cloud users data privacy using dynamic reconstruction of metadata. Journal of Network and Computer Applications, vol. 36(1), 235–248.
-
Downloads
-
How to Cite
Kavitha, K., Anuradha, D., & Pandian, P. (2018). A Survey on Securing and Optimizing Health Care Bigdata. International Journal of Engineering & Technology, 7(4.10), 504-507. https://doi.org/10.14419/ijet.v7i4.10.21212Received date: 2018-10-07
Accepted date: 2018-10-07
Published date: 2018-10-02