skip to main content
research-article

A Novel Multiobjective GDWCN-PSO Algorithm and Its Application to Medical Data Security

Published:24 May 2021Publication History
Skip Abstract Section

Abstract

Nature-inspired optimization is one of the most prevalent research domains with a confounding history that fascinates the research communities. Particle Swarm Optimization is one of the well-known optimizers that belongs to the family of nature-inspired algorithms. It often suffers from premature convergence leading to a local optimum. To address this, several methods were presented using different network topologies of the particles, but either lacked accuracy or were slow. To solve these problems, an improved version of the Directed Weighted Complex Network Particle Swarm Optimization using the Genetic Algorithm (GDWCN-PSO) is presented. This method uses the concept of the Genetic Algorithm after each update to enhance convergence and diversity. Since most of the real-world applications and complex optimization problems involve more than one objective function so to suit this problem, a multiobjective version of GDWCN-PSO is also proposed and validated on standard benchmarks. To demonstrate its applicability in real-world applications, GDWCN-PSO is applied to solve the optimal key-based medical image encryption. It is one of the most challenging problems in health IoTs for protecting sensitive and confidential patient data as well as addressing the major concern of integrity and security of data in today’s advanced digital world.

References

  1. Roy Pramono Adhie, Yonatan Hutama, A. Saleh Ahmar, and M. I. Setiawan. 2018. Implementation cryptography data encryption standard (DES) and triple data encryption standard (3DES) method in communication system based near field communication (NFC). In Journal of Physics: Conference Series, Vol. 954. IOP Publishing, Makassar, Indonesia, 012009.Google ScholarGoogle Scholar
  2. M. M. Annie Alphonsa and N. MohanaSundaram. 2019. A reformed grasshopper optimization with genetic principle for securing medical data. Journal of Information Security and Applications 47 (2019), 410–420.Google ScholarGoogle ScholarCross RefCross Ref
  3. Corey M. Angst, Emily S. Block, John D’arcy, and Ken Kelley. 2017. When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches. MIS Quarterly 41, 3 (2017), 893–916. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Carmelo J. A. Bastos-Filho, Marcel P. Caraciolo, Péricles B. C. Miranda, and Danilo F. Carvalho. 2008. Multi-ring particle swarm optimization. In Proceedings of the 10th Brazilian Symposium on Neural Networks (SBRN’08). IEEE, Salvador, Bahia, Brazil, 111–116. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Vandana Bharti, Bhaskar Biswas, and Kaushal Kumar Shukla. 2020. Recent trends in nature inspired computation with applications to deep learning. In Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, Noida, India, 294–299.Google ScholarGoogle ScholarCross RefCross Ref
  6. Riaan Brits, Andries P. Engelbrecht, and F, Van den Bergh. 2002. A niching particle swarm optimizer. In Proceedings of the 4th Asia-Pacific Conference on Simulated Evolution and Learning, Vol. 2. Singapore, Orchid Country Club, 692–696.Google ScholarGoogle Scholar
  7. Wilfried Daniels, Danny Hughes, Mahmoud Ammar, Bruno Crispo, Nelson Matthys, and Wouter Joosen. 2017. S v-the security microvisor: A virtualisation-based security middleware for the internet of things. In Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track. ACM, Las Vegas, Nevada, 36–42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ashraf Darwish, Aboul Ella Hassanien, Mohamed Elhoseny, Arun Kumar Sangaiah, and Khan Muhammad. 2019. The impact of the hybrid platform of Internet of Things and cloud computing on healthcare systems: Opportunities, challenges, and open problems. Journal of Ambient Intelligence and Humanized Computing 10, 10 (2019), 4151–4166.Google ScholarGoogle ScholarCross RefCross Ref
  9. Kalyanmoy Deb. 2001. Multi-objective Optimization Using Evolutionary Algorithms. Vol. 16. John Wiley & Sons, Chichester, UK. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Joaquín Derrac, Salvador García, Daniel Molina, and Francisco Herrera. 2011. A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm and Evolutionary Computation 1, 1 (2011), 3–18.Google ScholarGoogle ScholarCross RefCross Ref
  11. Ferdinando Di Martino and Salvatore Sessa. 2020. PSO image thresholding on images compressed via fuzzy transforms. Information Sciences 506 (2020), 308–324.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Wilfred J. Dixon. 1950. Analysis of extreme values. The Annals of Mathematical Statistics 21, 4 (1950), 488–506.Google ScholarGoogle ScholarCross RefCross Ref
  13. Mohamed Elhoseny, Ahmed Abdelaziz, Ahmed S. Salama, Alaa Mohamed Riad, Khan Muhammad, and Arun Kumar Sangaiah. 2018. A hybrid model of internet of things and cloud computing to manage big data in health services applications. Future Generation Computer Systems 86 (2018), 1383–1394.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Mohamed Elhoseny, K. Shankar, S. K. Lakshmanaprabu, Andino Maseleno, and N. Arunkumar. 2018. Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications - (2018), 1–15. DOI:https://doi.org/10.1007/s00521-018-3801-xGoogle ScholarGoogle Scholar
  15. Sahil Garg, Kuljeet Kaur, Shalini Batra, Georges Kaddoum, Neeraj Kumar, and Azzedine Boukerche. 2020. A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications. Future Generation Computer Systems 104 (2020), 105–118.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. David E. Goldberg and John Henry Holland. 1988. Genetic algorithms and machine learning. Machine Learning 3 (1988), 95–99. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Shivam Gupta, Arpan Kumar Kar, Abdullah Baabdullah, and Wassan A. A. Al-Khowaiter. 2018. Big data with cognitive computing: A review for the future. International Journal of Information Management 42 (2018), 78–89.Google ScholarGoogle ScholarCross RefCross Ref
  18. Ali Asghar Heidari, Seyedali Mirjalili, Hossam Faris, Ibrahim Aljarah, Majdi Mafarja, and Huiling Chen. 2019. Harris hawks optimization: Algorithm and applications. Future Generation Computer Systems 97 (2019), 849–872.Google ScholarGoogle ScholarCross RefCross Ref
  19. Yanxia Jin, Rong Zhu, Xin Qi, Jinrui Zhang, Qifu Cheng, Bo Ma, and Yao Jia. 2019. An image watermark insertion and extraction method based on EDA-PSO. In Proceedings of the 2019 2nd International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2019), Vol. 184. Atlantis Press, Beijing, China, 251–256. DOI:https://doi.org/10.2991/seeie-19.2019.58Google ScholarGoogle ScholarCross RefCross Ref
  20. Zhao Jing. 2014. Self-adaptive particle swarm optimization algorithm based on directed-weighted complex networks. Journal of Networks 9, 8 (2014), 2232–2238.Google ScholarGoogle Scholar
  21. Jae-Woo Kang, Hyeon-Jeong Park, Jong-Suk Ro, and Hyun-Kyo Jung. 2018. A strategy-selecting hybrid optimization algorithm to overcome the problems of the no free lunch theorem. IEEE Transactions on Magnetics 54, 3 (2018), 1–4.Google ScholarGoogle Scholar
  22. Javaid A. Kaw, Nazir A. Loan, Shabir A. Parah, Khan Muhammad, Javaid A. Sheikh, and Ghulam Mohiuddin Bhat. 2019. A reversible and secure patient information hiding system for IoT driven e-health. International Journal of Information Management 45 (2019), 262–275.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. James Kennedy. 2011. Particle swarm optimization. In Encyclopedia of Machine Learning. Springer, New York, 760–766.Google ScholarGoogle Scholar
  24. James Kennedy and Russell Eberhart. 1995. Particle swarm optimization. In Proceedings of ICNN’95-International Conference on Neural Networks, Vol. 4. IEEE, Perth, WA, 1942–1948.Google ScholarGoogle ScholarCross RefCross Ref
  25. Manju Khari, Aditya Kumar Garg, Amir H. Gandomi, Rashmi Gupta, Rizwan Patan, and Balamurugan Balusamy. 2019. Securing data in Internet of Things (IoT) using cryptography and steganography techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems 50, 1 (2019), 73–80.Google ScholarGoogle ScholarCross RefCross Ref
  26. Baiying Lei, Ee-Leng Tan, Siping Chen, Dong Ni, Tianfu Wang, and Haijun Lei. 2014. Reversible watermarking scheme for medical image based on differential evolution. Expert Systems with Applications 41, 7 (2014), 3178–3188. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Ming Li, Wenqiang Du, and Fuzhong Nian. 2014. An adaptive particle swarm optimization algorithm based on directed weighted complex network. Mathematical Problems in Engineering 2014 (2014), 1–7.Google ScholarGoogle ScholarCross RefCross Ref
  28. Weibo Liu, Zidong Wang, Yuan Yuan, Nianyin Zeng, Kate Hone, and Xiaohui Liu. 2019. A novel sigmoid-function-based adaptive weighted particle swarm optimizer. IEEE Transactions on Cybernetics Early Access (2019), 1–10. DOI:https://doi.org/10.1109/TCYB.2019.2925015Google ScholarGoogle ScholarCross RefCross Ref
  29. Leandros A. Maglaras, Ki-Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, and Tiago J. Cruz. 2018. Cyber security of critical infrastructures. ICT Express 4, 1 (2018), 42–45.Google ScholarGoogle ScholarCross RefCross Ref
  30. Gunasekaran Manogaran, Chandu Thota, Daphne Lopez, and Revathi Sundarasekar. 2017. Big Data Security Intelligence for Healthcare Industry 4.0. Springer International Publishing, Cham, 103–126. Google ScholarGoogle Scholar
  31. Angelina Jane Reyes Medina, Gregorio Toscano Pulido, and José Gabriel Ramírez-Torres. 2009. A comparative study of neighborhood topologies for particle swarm optimizers. In IJCCI. SciTePress, Mexico, 152–159.Google ScholarGoogle Scholar
  32. Xiannong Meng. 2002. Gap Test. Retrieved January 11, 2020 from https://www.eg.bucknell.edu/ xmeng/Course/CS6337/Note/master/node46.html.Google ScholarGoogle Scholar
  33. Seyedali Mirjalili and Jin Song Dong. 2020. Multi-Objective Optimization Using Artificial Intelligence Techniques. Springer, Cham. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Seyedali Mirjalili, Seyed Mohammad Mirjalili, and Andrew Lewis. 2014. Grey wolf optimizer. Advances in Engineering Software 69 (2014), 46–61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Kamlesh Mistry, Li Zhang, Siew Chin Neoh, Chee Peng Lim, and Ben Fielding. 2016. A micro-GA embedded PSO feature selection approach to intelligent facial emotion recognition. IEEE Transactions on Cybernetics 47, 6 (2016), 1496–1509.Google ScholarGoogle ScholarCross RefCross Ref
  36. Afsoon Moaref and Vahid Sattari Naeini. 2013. A particle swarm optimization based on a ring topology for fuzzy-rough feature selection. In Proceedings of the 13th Iranian Conference on Fuzzy Systems (IFSC’13). IEEE, Qazvin, Iran, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  37. Saraju P. Mohanty, Venkata P. Yanambaka, Elias Kougianos, and Deepak Puthal. 2020. PUFchain: A hardware-assisted blockchain for sustainable simultaneous device and data security in the Internet of Everything (IoE). IEEE Consumer Electronics Magazine 9, 2 (2020), 8–16.Google ScholarGoogle ScholarCross RefCross Ref
  38. A. Mullai and K. Mani. 2020. Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified swarm optimization and particle swarm optimization for mobile devices. International Journal of Information Technology - (2020), 1–14. DOI:https://doi.org/10.1007/s41870-019-00413-8Google ScholarGoogle Scholar
  39. Talat Naheed, Imran Usman, Tariq M. Khan, Amir H. Dar, and Muhammad Farhan Shafique. 2014. Intelligent reversible watermarking technique in medical images using GA and PSO. Optik 125, 11 (2014), 2515–2525.Google ScholarGoogle ScholarCross RefCross Ref
  40. Qingjian Ni and Jianming Deng. 2013. A new logistic dynamic particle swarm optimization algorithm based on random topology. The Scientific World Journal 2013 (2013), 1–8.Google ScholarGoogle ScholarCross RefCross Ref
  41. Thuy Xuan Pham, Patrick Siarry, and Hamouche Oulhadj. 2018. Integrating fuzzy entropy clustering with an improved PSO for MRI brain image segmentation. Applied Soft Computing 65 (2018), 230–242. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Sandeep Pirbhulal, Oluwarotimi Williams Samuel, Wanqing Wu, Arun Kumar Sangaiah, and Guanglin Li. 2019. A joint resource-aware and medical data security framework for wearable healthcare systems. Future Generation Computer Systems 95 (2019), 382–391.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Carlo Puliafito, Enzo Mingozzi, Francesco Longo, Antonio Puliafito, and Omer Rana. 2019. Fog computing for the Internet of Things: A survey. ACM Transactions on Internet Technology (TOIT) 19, 2 (2019), 1–41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Asanga Ratnaweera, Saman K. Halgamuge, and Harry C. Watson. 2004. Self-organizing hierarchical particle swarm optimizer with time-varying acceleration coefficients. IEEE Transactions on Evolutionary Computation 8, 3 (2004), 240–255. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Vipul Sharma and Roohie Naaz Mir. 2019. An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. Journal of King Saud University-Computer and Information Sciences - (2019), in press. DOI:https://doi.org/10.1016/j.jksuci.2019.03.009Google ScholarGoogle ScholarCross RefCross Ref
  46. Yuhui Shi and Russell C Eberhart. 1998. Parameter selection in particle swarm optimization. In International Conference on Evolutionary Programming. Springer, San Diego, CA, USA, 591–600. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Mojtaba Taherkhani and Reza Safabakhsh. 2016. A novel stability-based adaptive inertia weight for particle swarm optimization. Applied Soft Computing 38 (2016), 281–295. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, and Elie Bursztein. 2017. Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS'17). Association for Computing Machinery, New York, NY, USA, 1421--1434. DOI:https://doi.org/10.1145/3133956.3134067 Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Zhou Wang, Alan C. Bovik, Hamid R. Sheikh, and Eero P Simoncelli. 2004. Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing 13, 4 (2004), 600–612. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Xin Yao, Yong Liu, and Guangming Lin. 1999. Evolutionary programming made faster. IEEE Transactions on Evolutionary Computation 3, 2 (1999), 82–102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Hamza Yapici and Nurettin Cetinkaya. 2019. A new meta-heuristic optimizer: Pathfinder algorithm. Applied Soft Computing 78 (2019), 545–568.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Xingyi Zhang, Ye Tian, Ran Cheng, and Yaochu Jin. 2014. An efficient approach to nondominated sorting for evolutionary multiobjective optimization. IEEE Transactions on Evolutionary Computation 19, 2 (2014), 201–213.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Yong Zhang, Dun-wei Gong, Xiao-yan Sun, and Yi-nan Guo. 2017. A PSO-based multi-objective multi-label feature selection method in classification. Scientific Reports 7, 1 (2017), 1–12.Google ScholarGoogle Scholar
  54. Eckart Zitzler, Kalyanmoy Deb, and Lothar Thiele. 2000. Comparison of multiobjective evolutionary algorithms: Empirical results. Evolutionary Computation 8, 2 (2000), 173–195. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Novel Multiobjective GDWCN-PSO Algorithm and Its Application to Medical Data Security

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 21, Issue 2
      June 2021
      599 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3453144
      • Editor:
      • Ling Liu
      Issue’s Table of Contents

      Copyright © 2021 Association for Computing Machinery.

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 May 2021
      • Online AM: 7 May 2020
      • Revised: 1 April 2020
      • Accepted: 1 April 2020
      • Received: 1 February 2020
      Published in toit Volume 21, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format