Skip to main content

Advertisement

Log in

Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud

  • Systems-Level Quality Improvement
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Big Data and cloud computing are two essential issues in the recent years, empowers computing resources to be given as Information Technology services with high efficiency and effectiveness. So as to protect the security of data holders, data are regularly stored in the cloud in an encrypted form. In any case, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud along with access control. In this paper dissected the medical big data security utilizing encryption with access control process. Big database reduce process Map-Reduce framework with Optimal Fuzzy C means (OFCM) to Clustered data are accumulated in the cloud and furthermore using classification approach to classify sensitive and non-sensitive data in the cloud to encryption. This security process Triple DES (TDES) to encrypted and stored in the cloud and propose practical optimization techniques that further enhance the scheme’s performance, at long last authentication phase with attribute-based access control is used to authenticate data in cloud sim. From the proposed method the clustering, classification and encryption results are compared to existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Mathew, P. A., Dunn, L. N., Sohn, M. D., Mercado, A., Custudio, C., and Walter, T., Big-data for building energy performance: Lessons from assembling a very large national database of building energy use. J. Appl. Energ. 140:85–93, 2015.

    Article  Google Scholar 

  2. Cecchinel, C., Jimenez, M., Mosser, S., and Riveill, M., An architecture to support the collection of big data in the internet of things. Proceedings of 2014 IEEE 10th World Congress on Services. 442–449, 2014.

  3. Vennila, S., and Priyadarshini, J. J., Scalable privacy preservation in big data a survey. Proc. 2nd Int. Conf. Big Data Cloud Comput. 50:369–373, 2015.

    Google Scholar 

  4. Bernice M. Purcell, "Big data using cloud computing", Journal of Technology Research, pp.1–8, 2014

  5. Fernández, A., del Río, S., López, V., Bawakid, A., del Jesus, M. J., Benítez, J. M., and Herrera, F., Big data with cloud computing: An insight on the computing environment, MapReduce, and programming frameworks. Article: Wiley Interdiscip. Rev.: Data Mining Knowl. Discov. 4(5):380–409, 2014.

    Article  Google Scholar 

  6. Goli-Malekabadi, Z., Sargolzaei-Javan, M., and Akbari, M. K., An effective model for the store and retrieve big health data in cloud computing. J. Comput. Methods Programs Biomed. 132:75–82, 2016.

    Article  Google Scholar 

  7. Litchfield, A. T., and Althouse, J., A systematic review of cloud computing, big data, and databases on the cloud. Proc. Conf. Inform. Syst. 1–19, 2014.

  8. Neves, P. C., Schmerl, B., Bernardino, J. and Cámara, J., Big data in cloud computing: Features and issues: 1–8, 2013.

  9. Sadashiv, N. and DilipKumar, S. M., Cluster, grid and cloud computing: a detailed comparison. Proceedings of 6th International Conference on Computer Science & Education. 447–482. IEEE 2011.

  10. Kchaou1, H., Kechaou, Z., and Alimi, A. M., Towards an offloading framework based on big data analytics in mobile cloud computing environments. Proc. INNS Conf. Big Data 53:292–297.

    Article  Google Scholar 

  11. Shen, J., Liu, H., Shen, J., Tan, H. and He, D., Privacy preserving search schemes over encrypted cloud data: A comparative survey. Proceedings of first international conference on computational intelligence theory, systems and applications. 197–202, 2015.

  12. Zhang, Q., Yang, L. T. and Chen, Z., Privacy preserving deep computation model on cloud for big data feature learning. Trans. Comput. 1351–1362, 2016.

    Article  Google Scholar 

  13. Sanse, K., and Sharma, M., Clustering methods for big data analysis. Proc. Int. J. Adv. Res. Comput. Eng. Technol. 4:642–648, 2015.

    Article  Google Scholar 

  14. Yeo, C. S., Buyya, R., Pourreza, H., Eskicioglu, R., Graham P. and Sommers, F., Cluster computing: high-performance, high-availability, and high-throughput processing on a network of computers.521–551, 2016.

  15. Gheid, Z. and Challal, Y., Efficient and privacy-preserving k-means clustering for big data mining. TrustCom-BigData SE-ISPA: 791–798, 2016.

  16. Kim, S.-H., Jung C. and Lee, Y.-J., An entropy-based analytic model for the privacy-preserving in open data. Proceedings of international conference on Big Data. 3676–3684, 2016.

  17. Jha, S., Kruger, L. and McDaniel, P., Privacy preserving clustering. ESORICS: 397–417, 2017.

    Chapter  Google Scholar 

  18. Shen, W., Yang, G., Yu, J., Zhang, H., Kong, F., and Hao, R., Remote data possession checking with privacy-preserving authenticators for cloud storage. Proceedings of Future Generation Computer Systems. 1–46, 2017.

  19. Li, P., Chen, Z., Yang, L. T., Zhao, L. and Zhang, Q., A Privacy-preserving High-order Neuro-Fuzzy c-Means Algorithm with Cloud Computing. Proceedings of Neurocomputing. 1–15, 2016.

  20. Pasupuleti, S. K., Ramalingam, S., and Buyya, R., An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Proc. J. Netw. Comput. Applic. 64:12–22, 2015.

    Article  Google Scholar 

  21. Cao, X., Li, H., Dang, L. J., and Lin, Y., A two-party privacy preserving set intersection protocol against malicious users in cloud computing. Proc. Comput. Standards Interf. 54:41–45, 2016.

    Article  Google Scholar 

  22. Hu, G., Di Xiao, T. X., Bai, S., and Zhang, Y., A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Proc. Inform. Sci. 387:132–145, 2017.

    Article  Google Scholar 

  23. Jesu, J., Nayahi, V., and Kavitha, V., Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop. Proc. Future Gen. Comput. Syst. 74:393–408, 2016.

    Google Scholar 

  24. Tsai, C.-F., Lin, W.-C., and Ke, S.-w., Big data mining with parallel computing: A comparison of distributed and MapReduce methodologies. Proc. J. Syst. Softw. 122:83–92, 2015.

    Article  Google Scholar 

  25. Ye, A., Yacheng Li, and Li, Xu, Anovellocation privacy-preserving scheme based on l-queries for continuous LBS. Proc. Comput. Commun. 1–10, 2016.

    Article  Google Scholar 

  26. Zhang, Q., Yang, L. T., Chen, Z., and Li, P., PPHOPCM: Privacy-preserving high-order Possibilistic c-means algorithm for big data clustering with cloud computing. IEEE Trans. Big Data. 1–11, 2017.

  27. Yang, M.-S., and Nataliani, Y., Robust-learning fuzzy c-means clustering algorithm with unknown number of clusters. J. Pattern Recogn. 71:45–59, 2017.

    Article  Google Scholar 

  28. Abualigah, L. M., Khader, A. T., Al-Betar, M. A., and Gandomic, A. H., A novel hybridization strategy for krill herd algorithm applied to clustering techniques. J. Appl. Soft Comput. 60:423–435, 2017.

    Article  Google Scholar 

  29. Feng, C., and Liao, S., Scalable Gaussian kernel support vector machines with sublinear training time complexity. J. Inform. Sci. 418:480–494, 2017.

    Article  Google Scholar 

  30. Karthik and Muruganandam, Data encryption and decryption by using triple DES and performance analysis of crypto system. J. Sci. Eng. Res. 2(1):24–31, 2014.

    Google Scholar 

  31. Sookhak, M., Yu, R., KhurramKhan, M., Xiang, Y., and Buyya, R., Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. J. Fut. Gen. Comput. Syst. 72:273–287, 2017.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Shanmugapriya.

Ethics declarations

Conflict of Interest

This paper has not communicated anywhere till this moment, now only it is communicated to your esteemed journal for the publication with the knowledge of all co-authors.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Systems-Level Quality Improvement

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shanmugapriya, E., Kavitha, R. Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud. J Med Syst 43, 265 (2019). https://doi.org/10.1007/s10916-019-1374-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-019-1374-6

Keywords

Navigation