Analysis of Security in Big Data Related to Healthcare

Big data facilitates the processing and management of huge amounts of data. In health, the main information source is the electronic health record with others being the Internet and social media. Health-related data refers to storage in big data based on and shared via electronic means. Why are criminal organisations interested in this data? These organisations can blackmail people with information related to their health condition or sell the information to marketing companies, etc. This article analyses healthcare-related big data security and proposes different solutions. There are different techniques available to help preserve privacy such as data modification techniques, cryptographic methods and protocols for data sharing, query auditing methods and others that are analysed in this research work. Although there remains much to do in the field of big data security, research in this area is moving forward , both from a scientific and commercial point of view.

[1]  Benjamin H. Brinkmann,et al.  Large-scale electrophysiology: Acquisition, compression, encryption, and storage of big data , 2009, Journal of Neuroscience Methods.

[2]  Jing Peng A New Model of Data Protection on Cloud Storage , 2014, J. Networks.

[3]  J. V. Cordeiro,et al.  Health data privacy and confidentiality rights: Crisis or redemption? , 2014 .

[4]  Michael Backes,et al.  Secure Key-Updating for Lazy Revocation , 2006, ESORICS.

[5]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[6]  S. Mary Saira Bhanu,et al.  Two layered protection for sensitive data in cloud , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[7]  Stefan Gottschalk,et al.  Privacy Preserving Data Mining Models And Algorithms , 2016 .

[8]  Jinjun Chen,et al.  External integrity verification for outsourced big data in cloud and IoT: A big picture , 2015, Future Gener. Comput. Syst..

[9]  Jason Crampton,et al.  On key assignment for hierarchical access control , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).

[10]  V. Kavitha,et al.  A Metadata Based Storage Model for Securing Data in Cloud Environment , 2011, CyberC.

[11]  Marina Blanton,et al.  Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.

[12]  Isabel de la Torre Díez,et al.  Privacy and Security in Mobile Health Apps: A Review and Recommendations , 2014, Journal of Medical Systems.

[13]  Xiaoban Wu,et al.  OpenDBDDAS Toolkit: Secure MapReduce and Hadoop-like Systems , 2015, ICCS.

[14]  Shiping Chen,et al.  Protecting and Analysing Health Care Data on Cloud , 2014 .

[15]  Dear Mr Sotiropoulos ARTICLE 29 Data Protection Working Party , 2013 .

[16]  Isabel de la Torre-Díez,et al.  Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers , 2015, Journal of medical Internet research.

[17]  Sang-Soo Yeo,et al.  Double Privacy Layer Architecture for Big Data Framework , 2016 .

[18]  Atul J Butte,et al.  Collaborative Biomedicine in the Age of Big Data: The Case of Cancer , 2014, Journal of medical Internet research.

[19]  Athanasios V. Vasilakos,et al.  Two Schemes of Privacy-Preserving Trust Evaluation , 2016, Future Gener. Comput. Syst..

[20]  Bing Zeng,et al.  A novel group key transfer for big data security , 2014, Appl. Math. Comput..