A Survey on Securing and Optimizing Health Care Bigdata

  • Authors

    • K. Kavitha
    • D. Anuradha
    • P. Pandian
    https://doi.org/10.14419/ijet.v7i4.10.21212

    Received date: October 7, 2018

    Accepted date: October 7, 2018

    Published date: October 2, 2018

  • Big-data, Healthcare, Information security, Optimization, Multi-objective optimization, Simulation.
  • Abstract

    Huge amount of health care data are available online to improve the overall performance of health care system. Since this huge health care Big-data is valuable and sensitive, it requires safety. In this paper we analyze numerous ways in which the health care Big-data can be protected. In recent days many augmented security algorithm that are suitable for Big-data have emerged like, El-Gamal, Triple-DES, and Homomorphic algorithms. Also authentication and access control can be implemented over Big-data using Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) schemes.

    Along with security to Big-data we try to evolve the ways in which the valuable Big-data can be optimized to improve the Big-data analysis. Mathematical optimization techniques such as simple and multi-purpose optimization and simulation are employed in Big-data to maximize the patient satisfaction and usage of doctor’s consulting facility. And also, to minimize the cost spent by patient and energy wasted.

  • References

    1. AlexandruSoceanu, AlexandruEgner, TraianMuntean (2015), Man-aging the Privacy and Security of eHealth Data. 20th International Conference on Control Systems and Science, 978-1-4799-1780-8/15 $31.00 © IEEE.
    2. AmineRahmani, Abdelmalek Amine and Mohamed Reda Hamou (2015), A mathematical model of access control in big data using confidence interval and digital signature. Computer Science and In-formation Technology, 183-198.
    3. Arthur C (2011), PlayStation Network: hackers claim to have 2.2m credit cards. The Guardian Technology Blog. http://www.guardian.co.uk/technology/blog/2011/apr/29/playstationnetwork-hackers-credit-cards.
    4. Balana, open source XACML 3.0 implementation http://xacmlinfo.org/category/balana.
    5. Brosette SE, Spragre AP, Jones WT, Moser SA (2000),A data min-ing system for infection control surveillance. Methods Inf Med, 303-310.
    6. DananThilakanathan, Yu Zhao, Shiping Chen, Surya Nepal, Rafael CalvoandAbelardo Pardo A (2014), Protecting and Analysing Health Care Data on Cloud“,978-1-4799-8085-7/14 $31.00 ©IEEE
    7. Dolski S, Huonder F and Oberholzer S (2007), HERAS-AF: XACML 2.0 Implementation, Technical Report, University of Ap-plied Sciences Rapperswil.
    8. Enterprise-Java-XACML, http://code.google.com/p/enterprise-javaxacml
    9. Hagner M (2007), Security infrastructure and national patent sum-mary. In Tromso Telemedicine and eHealth Conference.
    10. Halamka JD (2015), Using Big Data to Make Wiser Medical Deci-sions, Harvard Business Review,[Online]. Available: https://hbr.org/2015/12/using-big-data-to-makewiser-medical-decisions.
    11. Hamid Reza Feili (2013), Improving the health care systems per-formance by simulation optimization. Journal of Mathematics and Computer Science, 7. 73-79.
    12. Healthcare costs rise to $130bn, or $5800 per Australian: report. http://www.news.com.au/lifestyle/health/health-spending-reaches-130b-report/story-fneuz9ev-1226481443042
    13. Indiana Health Information Exchange (2016), http://www.ihie.org
    14. Kaluvuri S, Egner A, Hartog J and Zannone N (2015), SAFAX – An Extensible Authorization Service for Cloud Environments, Frontiers in Computer and Network Security.
    15. Karvelas P (2014), Australias mental health system must become more efficient. The Australian. Source: http://www.theaustralian.com.au/nationalaffairs/policy/australiasmental-health-system-must-become-more-efficient/story-fn59nokw-1226850819260.
    16. Ko SY, Jeon K, Morales R (2011), The HybrEx model for confi-dentiality and privacy in cloud computing. In: 3rd USENIX work-shop on hot topics in cloud computing, HotCloud’11, Portland.
    17. KupwadePatil H and Seshadri R (2014), Big Data Security and Pri-vacy Issues in Healthcare, IEEE International Congress on Big Data, 762–765.
    18. Laila En-nahli, Hamid Allaoui and IssamNouaouri (2015), A multi-objective modelling to human resource assignment and routing problem for home health care services. Science Direct, 698-703.
    19. Liu A, Chen F, Hwang J and Xie T (2011), Designing fast and scal-able XACML policy evaluation engines. IEEE Trans. Computers, 60(12) 1802-1817.
    20. Liu S (2013), Exploring the Future of Computing. IT Professional, vol. 15(1), 2–3.
    21. Marr B (2015), How Big Data Is Changing Healthcare. Forbes, [Online]. Available: http://onforb.es/1bfRQ0b.
    22. Mohan A, Blough DM (2010), An Attribute-Based Authorization Policy Framework with Dynamic Conflict Resolution. Proceedings of the 9th Symposium on Identity and Trust on the Internet.
    23. Patrizio A (2007), Salesforce.com Scrambles To Halt Phishing At-tacks. Internet News.com. http://www.internetnews.com/ent-news/article.php.
    24. Priyank J, Manasi G and Nilay K (2016), Big data privacy: a tech-nological perspective and review. In Journal of Big Data.
    25. RuiZhangand Ling Liu (2010), Security Models and Requirements for Healthcare Application Clouds. IEEE 3rd International Confer-ence on Cloud Computing.,
    26. Samanthula BK, Elmehdwi Y and Jiang W (2015), K-nearest neighbour classification over semantically secure encrypted relation-al data. IEEE Transactions on Knowledge and Data Engineering, vol. 27(5), 1261–1273.
    27. Sathya S, Sethukarasi T (2016), Efficient privacy preservation tech-nique for healthcare records using big data. International Confer-ence On Information Communication And Embedded System (ICICES) 978-1-5090-2552-7.
    28. Science Applications International Corporation (2004) (SAIC). Role-Based Access Control (RBAC) Role Engineering Process Ver-sion 3.0.
    29. Sun’sXCAMLImplementation,http://sunxacml.sourceforge.net/
    30. Ulusoy H, Kantarcioglu M, Pattuk E and Kagal L (2015), Account-able MR: Toward accountable MapReduce systems. IEEE Interna-tional Conference on Big Data, 451–460.
    31. VassilikiKoufi, Flora Malamateniou and George Vassilacopoulos (2015), A big data driven model for the optimization of healthcare processes, European Federation for Medical Informatics, 697-701.
    32. Vishnu S Basuthkar, ChetanaSrinivas (2016), A survey of cost ef-fective big data in healthcare applications. International Journal of Computer Applications, 23-27.
    33. Waqar A, Raza A, Abbas H and Khurram Khan M (2013), A framework for preservation of cloud users data privacy using dy-namic reconstruction of metadata. Journal of Network and Com-puter Applications, vol. 36(1), 235–248.
  • Downloads

  • How to Cite

    Kavitha, K., Anuradha, D., & Pandian, P. (2018). A Survey on Securing and Optimizing Health Care Bigdata. International Journal of Engineering and Technology, 7(4.10), 504-507. https://doi.org/10.14419/ijet.v7i4.10.21212