Abstract
Big Data and cloud computing are two essential issues in the recent years, empowers computing resources to be given as Information Technology services with high efficiency and effectiveness. So as to protect the security of data holders, data are regularly stored in the cloud in an encrypted form. In any case, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud along with access control. In this paper dissected the medical big data security utilizing encryption with access control process. Big database reduce process Map-Reduce framework with Optimal Fuzzy C means (OFCM) to Clustered data are accumulated in the cloud and furthermore using classification approach to classify sensitive and non-sensitive data in the cloud to encryption. This security process Triple DES (TDES) to encrypted and stored in the cloud and propose practical optimization techniques that further enhance the scheme’s performance, at long last authentication phase with attribute-based access control is used to authenticate data in cloud sim. From the proposed method the clustering, classification and encryption results are compared to existing approaches.
Similar content being viewed by others
References
Mathew, P. A., Dunn, L. N., Sohn, M. D., Mercado, A., Custudio, C., and Walter, T., Big-data for building energy performance: Lessons from assembling a very large national database of building energy use. J. Appl. Energ. 140:85–93, 2015.
Cecchinel, C., Jimenez, M., Mosser, S., and Riveill, M., An architecture to support the collection of big data in the internet of things. Proceedings of 2014 IEEE 10th World Congress on Services. 442–449, 2014.
Vennila, S., and Priyadarshini, J. J., Scalable privacy preservation in big data a survey. Proc. 2nd Int. Conf. Big Data Cloud Comput. 50:369–373, 2015.
Bernice M. Purcell, "Big data using cloud computing", Journal of Technology Research, pp.1–8, 2014
Fernández, A., del Río, S., López, V., Bawakid, A., del Jesus, M. J., Benítez, J. M., and Herrera, F., Big data with cloud computing: An insight on the computing environment, MapReduce, and programming frameworks. Article: Wiley Interdiscip. Rev.: Data Mining Knowl. Discov. 4(5):380–409, 2014.
Goli-Malekabadi, Z., Sargolzaei-Javan, M., and Akbari, M. K., An effective model for the store and retrieve big health data in cloud computing. J. Comput. Methods Programs Biomed. 132:75–82, 2016.
Litchfield, A. T., and Althouse, J., A systematic review of cloud computing, big data, and databases on the cloud. Proc. Conf. Inform. Syst. 1–19, 2014.
Neves, P. C., Schmerl, B., Bernardino, J. and Cámara, J., Big data in cloud computing: Features and issues: 1–8, 2013.
Sadashiv, N. and DilipKumar, S. M., Cluster, grid and cloud computing: a detailed comparison. Proceedings of 6th International Conference on Computer Science & Education. 447–482. IEEE 2011.
Kchaou1, H., Kechaou, Z., and Alimi, A. M., Towards an offloading framework based on big data analytics in mobile cloud computing environments. Proc. INNS Conf. Big Data 53:292–297.
Shen, J., Liu, H., Shen, J., Tan, H. and He, D., Privacy preserving search schemes over encrypted cloud data: A comparative survey. Proceedings of first international conference on computational intelligence theory, systems and applications. 197–202, 2015.
Zhang, Q., Yang, L. T. and Chen, Z., Privacy preserving deep computation model on cloud for big data feature learning. Trans. Comput. 1351–1362, 2016.
Sanse, K., and Sharma, M., Clustering methods for big data analysis. Proc. Int. J. Adv. Res. Comput. Eng. Technol. 4:642–648, 2015.
Yeo, C. S., Buyya, R., Pourreza, H., Eskicioglu, R., Graham P. and Sommers, F., Cluster computing: high-performance, high-availability, and high-throughput processing on a network of computers.521–551, 2016.
Gheid, Z. and Challal, Y., Efficient and privacy-preserving k-means clustering for big data mining. TrustCom-BigData SE-ISPA: 791–798, 2016.
Kim, S.-H., Jung C. and Lee, Y.-J., An entropy-based analytic model for the privacy-preserving in open data. Proceedings of international conference on Big Data. 3676–3684, 2016.
Jha, S., Kruger, L. and McDaniel, P., Privacy preserving clustering. ESORICS: 397–417, 2017.
Shen, W., Yang, G., Yu, J., Zhang, H., Kong, F., and Hao, R., Remote data possession checking with privacy-preserving authenticators for cloud storage. Proceedings of Future Generation Computer Systems. 1–46, 2017.
Li, P., Chen, Z., Yang, L. T., Zhao, L. and Zhang, Q., A Privacy-preserving High-order Neuro-Fuzzy c-Means Algorithm with Cloud Computing. Proceedings of Neurocomputing. 1–15, 2016.
Pasupuleti, S. K., Ramalingam, S., and Buyya, R., An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Proc. J. Netw. Comput. Applic. 64:12–22, 2015.
Cao, X., Li, H., Dang, L. J., and Lin, Y., A two-party privacy preserving set intersection protocol against malicious users in cloud computing. Proc. Comput. Standards Interf. 54:41–45, 2016.
Hu, G., Di Xiao, T. X., Bai, S., and Zhang, Y., A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Proc. Inform. Sci. 387:132–145, 2017.
Jesu, J., Nayahi, V., and Kavitha, V., Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop. Proc. Future Gen. Comput. Syst. 74:393–408, 2016.
Tsai, C.-F., Lin, W.-C., and Ke, S.-w., Big data mining with parallel computing: A comparison of distributed and MapReduce methodologies. Proc. J. Syst. Softw. 122:83–92, 2015.
Ye, A., Yacheng Li, and Li, Xu, Anovellocation privacy-preserving scheme based on l-queries for continuous LBS. Proc. Comput. Commun. 1–10, 2016.
Zhang, Q., Yang, L. T., Chen, Z., and Li, P., PPHOPCM: Privacy-preserving high-order Possibilistic c-means algorithm for big data clustering with cloud computing. IEEE Trans. Big Data. 1–11, 2017.
Yang, M.-S., and Nataliani, Y., Robust-learning fuzzy c-means clustering algorithm with unknown number of clusters. J. Pattern Recogn. 71:45–59, 2017.
Abualigah, L. M., Khader, A. T., Al-Betar, M. A., and Gandomic, A. H., A novel hybridization strategy for krill herd algorithm applied to clustering techniques. J. Appl. Soft Comput. 60:423–435, 2017.
Feng, C., and Liao, S., Scalable Gaussian kernel support vector machines with sublinear training time complexity. J. Inform. Sci. 418:480–494, 2017.
Karthik and Muruganandam, Data encryption and decryption by using triple DES and performance analysis of crypto system. J. Sci. Eng. Res. 2(1):24–31, 2014.
Sookhak, M., Yu, R., KhurramKhan, M., Xiang, Y., and Buyya, R., Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. J. Fut. Gen. Comput. Syst. 72:273–287, 2017.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
This paper has not communicated anywhere till this moment, now only it is communicated to your esteemed journal for the publication with the knowledge of all co-authors.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection on Systems-Level Quality Improvement
Rights and permissions
About this article
Cite this article
Shanmugapriya, E., Kavitha, R. Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud. J Med Syst 43, 265 (2019). https://doi.org/10.1007/s10916-019-1374-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-019-1374-6