Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks

In the recent past, Internet of Things (IoT) plays a significant role in different applications such as health care, industrial sector, defense and research etc.… It provides effective framework in maintaining the security, privacy and reliability of the information in internet environment. Among various applications as mentioned health care place a major role, because security, privacy and reliability of the medical information is maintained in an effective way. Even though, IoT provides the effective protocols for maintaining the information, several intermediate attacks and intruders trying to access the health information which in turn reduce the privacy, security and reliability of the entire health care system in internet environment. As a result and to solve the issues, in this research Learning based Deep-Q-Networks has been introduced for reducing the malware attacks while managing the health information. This method examines the medical information in different layers according to the Q-learning concept which helps to minimize the intermediate attacks with less complexity. The efficiency of the system has been evaluated with the help of experimental results and discussions.

[1]  Jong Hyuk Park,et al.  An enhanced security framework for home appliances in smart home , 2017, Human-centric Computing and Information Sciences.

[2]  Xiangjian He,et al.  A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.

[3]  Mariana Gerber,et al.  Information security risk measures for Cloud-based personal health records , 2014, International Conference on Information Society (i-Society 2014).

[4]  Robert Steele,et al.  The Internet of Things and Next-generation Public Health Information Systems , 2013 .

[5]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[6]  Michael Biehl,et al.  Adaptive Relevance Matrices in Learning Vector Quantization , 2009, Neural Computation.

[7]  Cong Wang,et al.  Security and privacy mechanism for health internet of things , 2013 .

[8]  Hwee Pink Tan,et al.  Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.

[9]  Kan Siew Leong,et al.  A secure multi-hop routing for IoT communication , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[10]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[11]  Fagen Li,et al.  Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.

[12]  Dumitru Erhan,et al.  Deep Neural Networks for Object Detection , 2013, NIPS.

[13]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[14]  Sucha Smanchat,et al.  INTERNET OF THINGS: A REVIEW OF APPLICATIONS AND TECHNOLOGIES , 2014 .

[15]  NICK FEAMSTER MITIGATING THE INCREASING RISKS OF AN INSECURE INTERNET OF THINGS , 2018 .

[16]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[17]  Samy Bengio,et al.  Links between perceptrons, MLPs and SVMs , 2004, ICML.

[18]  J. Pujol The solution of nonlinear inverse problems and the Levenberg-Marquardt method , 2007 .

[19]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[20]  Martin A. Riedmiller,et al.  Reinforcement learning for robot soccer , 2009, Auton. Robots.

[21]  Mohd Anwar,et al.  Security & Privacy Challenges in IoT-Based Health Cloud , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).

[22]  Chin-Lung Hsu,et al.  An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives , 2016, Comput. Hum. Behav..

[23]  R. S. H. Istepanian,et al.  The potential of Internet of m-health Things “m-IoT” for non-invasive glucose level sensing , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[24]  Michael Biehl,et al.  Distance Learning in Discriminative Vector Quantization , 2009, Neural Computation.

[25]  Rajendra K. Raj,et al.  Secure Access for Healthcare Data in the Cloud Using Ciphertext-Policy Attribute-Based Encryption , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.

[26]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[27]  R. Polikar,et al.  Ensemble based systems in decision making , 2006, IEEE Circuits and Systems Magazine.