[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector

  • Special Issue
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

Cloud computing is a computing paradigm that provides vibrant accessible infrastructure for data, application and file storage as well. This technology advancement benefits in a significant lessening of consumption cost, application hosting, content storage as well as delivery, and hence the concept appear gradually more in all entities that exploited in the healthcare sector. Under such circumstances, efficient analysis and data extraction from a cloud environment is more challenging. Moreover, the extracted data has to be preserved for privacy. To handle these challenges, this paper has come out with a privacy-preserving algorithm in both data sanitization and data restoration process. Further, several researchers have contributed advancement in the restoration process, yet the accuracy of restoration seems to be very low. As a solution to this problem, this paper uses a hybrid algorithm termed as genetically modified glowworm swarm for both data sanitization and data restoration process. Further, the developed hybridization model compares its performance with other conventional models like conventional glowworm swarm optimization, firefly, particle swarm optimization, artificial bee colony, crow search, group search optimization and genetic algorithm in terms of statistical analysis, sanitization and restoration effectiveness, convergence analysis and key sensitivity analysis, and the dominance of the developed model is proved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Sahi A, Lai D, Li Y (2016) Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Comput Biol Med 78:1–8

    Article  Google Scholar 

  2. Zhou J, Cao Z, Dong X, Lin X (2015) PPDM: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J Select Top Signal Process 9(7):1332–1344

    Article  Google Scholar 

  3. Gatzoulis L, Iakovidis I (2007) Wearable and portable ehealth systems. IEEE Eng Med Biol Mag 26(5):51–56

    Article  Google Scholar 

  4. Takabi H, Joshi JBD, Ahn GJ (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24–31

    Article  Google Scholar 

  5. Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gen Comput Syst 28(3):583–592

    Article  Google Scholar 

  6. Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud computing vulnerabilities. IEEE Secur Priv 9(2):50–57

    Article  Google Scholar 

  7. Zhang K, Liang X, Shen X, Lu R (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun Mag 52(3):58–65

    Article  Google Scholar 

  8. Liu X, Lu R, Ma J, Chen L, Qin B (2016) Privacy-preserving patient-centric clinical decision support system on naïve bayesian classification. IEEE J Biomed Health Inf 20(2):655–668

    Article  Google Scholar 

  9. Barua M, Liang X, Lu R, Shen X (2011) ESPAC: enabling security and patient-centric access control for ehealth in cloud computing. Int J Secur Netw 6(2–3):67–76

    Google Scholar 

  10. Viswanathan H, Chen B, Pompili D (2012) Research challenges in computation, communication, and context awareness for ubiquitous healthcare. IEEE Commun Mag 50(5):92–99

    Article  Google Scholar 

  11. Lee SH, Song JH, Kim IK (2016) CDA generation and integration for health information exchange based on cloud computing system. IEEE Trans Serv Comput 9(2):241–249

    Article  Google Scholar 

  12. Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542–555

    Article  MathSciNet  Google Scholar 

  13. Azadeh A, Fam IM, Khoshnoud M, Nikafrouz M (2008) Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: the case of a gas refinery. Inf Sci 178(22):4280–4300,

    Article  Google Scholar 

  14. Zhang K, Liang X, Baura M, Lu R, (Sherman)Shen X (2014) PHDA: a priority based health data aggregation with privacy preservation for cloud assisted WBANs. Inf Sci 284:130–141

    MathSciNet  Google Scholar 

  15. Wang W, Chen L, Zhang Q (2015) Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput Netw 88:136–148

    Article  Google Scholar 

  16. Iakovidis I (1998) Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare record in Europe. Int J Med Inf 52(1–3):105–115

  17. Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631

    Article  Google Scholar 

  18. Li H, Xiong L, Ohno-Machado L, Jiang X (2014) Privacy preserving RBF kernel support vector machine. BioMed Res Int 2014:1–10

    Google Scholar 

  19. Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In: 2010 Proceedings IEEE INFOCOM, pp 1–9

  20. Shi E, Chan T, Rieffel E, Chow R, Song D (2011) Privacy-preserving aggregation of time-series data. In: Proceedings of NDSS

  21. Shi J, Zhang R, Liu Y, Zhang Y (2010) PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. In: 2010 Proceedings IEEE INFOCOM, San Diego, CA, pp 1–9

  22. Kumar BSS, Manjunath AS, Christopher S (2018) Improved entropy encoding for high efficient video coding standard. Alexandria Eng J 57(1):1–9

    Article  Google Scholar 

  23. Kota PN, Gaikwad AN (2017) Optimized scrambling sequence to reduce papr in space frequency block codes based MIMO-OFDM system. J Adv Res Dyn Control Syst:502–525

  24. Bhatnagar K, Gupta S (2017) Extending the neural model to study the impact of effective area of optical fiber on laser intensity. Int J Intell Eng Syst 10(4):274–283

    Article  Google Scholar 

  25. Balaji GN, Subashini TS, Chidambaram N (2015) Detection of heart muscle damage from automated analysis of echocardiogram video. IETE J Res 61(3):236–243

    Article  Google Scholar 

  26. Bramhe SS, Dalal A, Tajne D, Marotkar D (2015) Glass shaped antenna with defected ground structure for cognitive radio application. In: International conference on computing communication control and automation, Pune, pp 330–333

  27. Waqar A, Raza A, Abbas H, Khan MK (2013) A framework for preservation of cloudusers’data privacy using dynamic reconstruction of metadata. J Netw Comput Appl 36:235–248

    Article  Google Scholar 

  28. Nallakumar MR, Sengottaiyan N, MohamedArif M (2014) Cloud computing and methods for privacy preservation: a survey. IJARCET 3(11)

  29. Yarrapragada KSSR, Krishna BB Impact of tamanu oil-diesel blend on combustion, performance and emissions of diesel engine and its prediction methodology. J Braz Soc Mech Sci Eng:1–15

  30. Sreedharan N, Preetha N, Ganesan B, Raveendran R, Sarala P, Dennis B, Rajakumar Boothalingam R (2018) Grey Wolf optimisation-based feature selection and classification for facial emotion recognition. IET Biometr

  31. Sarkar A, Murugan TS (2017) Cluster head selection for energy efficient and delay-less routing in wireless sensor network. Wirel Netw:1–18

  32. Wagh AM, Todmal SR (2015) Eyelids, eyelashes detection algorithm and hough transform method for noise removal in iris recognition. Int J Comput Appl 112(3):28–31

    Google Scholar 

  33. Iyapparaja M, Tiwari M (2017) Security policy speculation of user uploaded images on content sharing sites. IOP Conf Ser Mater Sci Eng 263(4):042019

    Article  Google Scholar 

  34. Chandramohan D, Vengattaraman T, Dhavachelvan P (2017) A secure data privacy preservation for on-demand cloud service. J King Saud Univ Eng Sci 29(2):144–150

    Google Scholar 

  35. Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145

    Article  Google Scholar 

  36. Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Rep 39:51–57

    Google Scholar 

  37. Wu B, Qian C, Ni W, Fan S (2012) The improvement of glowworm swarm optimization for continuous optimization problems. Expert Syst Appl 39(7):6335–6342

    Article  Google Scholar 

  38. McCall J (2005) Genetic algorithms for modelling and optimisation. J Comput Appl Math 184(1):205–222

    Article  MathSciNet  Google Scholar 

  39. Karaboga D, Basturk B (2008) On the performance of artificial bee colony (ABC) algorithm. Appl Soft Comput 8(1):687–697

    Article  Google Scholar 

  40. Tanweer MR, Suresh S, Sundararajan N (2015) Self regulating particle swarm optimization algorithm. Inf Sci 294:182–202

    Article  MathSciNet  Google Scholar 

  41. Fister I, Fister I Jr, Yang XS, Brest J (2013) A comprehensive review of firefly algorithms. Swarm Evolut Comput 13:34–46

    Article  Google Scholar 

  42. Gupta D, Sundaram S, Khanna A, Hassanien AE, de Albuquerque VHC (2018) Improved diagnosis of Parkinson’s disease using optimized crow search algorithm. Comput Electr Eng 68:412–424

    Article  Google Scholar 

  43. He S, Wu QH, Saunders JR (2009) Group search optimizer: an optimization algorithm inspired by animal searching behavior. IEEE Trans Evol Comput 13(5):973–990

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. M. Annie Alphonsa.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Annie Alphonsa, M.M., Amudhavalli, P. Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector. Evol. Intel. 11, 101–116 (2018). https://doi.org/10.1007/s12065-018-0162-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-018-0162-4

Keywords

Navigation