A reformed grasshopper optimization with genetic principle for securing medical data

Abstract Cloud computing is an emerging computing technology that uses the internet and central remote servers to sustain data and applications. Using cloud computing, users can access database resources through internet from anywhere without distressing about the management of actual resources. This concept can be used almost in all fields including the healthcare sector. In such situations, data mining and their effective investigation from cloud are more demanding due to the privacy in data preservation. Consequently, the privacy and security of the information system is under major risk because of security attacks like Known Plain text attack (KPA) and Cipher Text attack (CPA). To manage these issues, this paper describes privacy preservation approach with data sanitization and data restoration process for securing medical data. Moreover, several researchers have proposed enhancements to the restoration process, since it causes a low accuracy. As a solution to this crisis, this paper uses a hybrid algorithm known as Grasshopper Optimization with Genetic Algorithm (GOAGA) for the data sanitization and restoration process. Further, the performance of this hybrid approach is compared with other conventional approaches in terms of the sanitization and restoration effectiveness, convergence, statistical and key sensitivity analysis and thus the governance of the progressed approach is validated.

[1]  Sheikh Iqbal Ahamed,et al.  A privacy preserving framework for RFID based healthcare systems , 2017, Future Gener. Comput. Syst..

[2]  Janez Brest,et al.  A comprehensive review of firefly algorithms , 2013, Swarm Evol. Comput..

[3]  Yongquan Zhou,et al.  A Glowworm Swarm Optimization Algorithm Based Tribes , 2013 .

[4]  J. McCall,et al.  Genetic algorithms for modelling and optimisation , 2005 .

[5]  P. Amudhavalli,et al.  Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector , 2018, Evol. Intell..

[6]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[7]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[8]  Ilias Iakovidis,et al.  Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare record in Europe , 1998, Int. J. Medical Informatics.

[9]  Baozhi Chen,et al.  Research challenges in computation, communication, and context awareness for ubiquitous healthcare , 2012, IEEE Communications Magazine.

[10]  L. Gatzoulis,et al.  Wearable and Portable eHealth Systems , 2007, IEEE Engineering in Medicine and Biology Magazine.

[11]  Qian Zhang,et al.  Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation , 2015, Comput. Networks.

[12]  Xiaodong Lin,et al.  SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.

[13]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[14]  Xiaolei Dong,et al.  PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems , 2015, IEEE Journal of Selected Topics in Signal Processing.

[15]  A. Giorgio,et al.  The roles of motor activity and environmental enrichment in intellectual disability. , 2017 .

[16]  Nesrine Kaaniche,et al.  Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms , 2017, Comput. Commun..

[17]  Xiaohui Liang,et al.  PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs , 2014, Inf. Sci..

[18]  Jianfeng Ma,et al.  Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification , 2016, IEEE Journal of Biomedical and Health Informatics.

[19]  S. N. Talbar,et al.  An Adaptive Entropy Based Scale Invariant Face Recognition Face Altered by Plastic Surgery , 2018, Pattern Recognition and Image Analysis.

[20]  Rui Zhang,et al.  PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[21]  Bin Wu,et al.  The improvement of glowworm swarm optimization for continuous optimization problems , 2012, Expert Syst. Appl..

[22]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[23]  D. Karaboga,et al.  On the performance of artificial bee colony (ABC) algorithm , 2008, Appl. Soft Comput..

[24]  Narasimhan Sundararajan,et al.  Self regulating particle swarm optimization algorithm , 2015, Inf. Sci..

[25]  Xiaohui Liang,et al.  ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.

[26]  Xiaohui Liang,et al.  Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation , 2014, IEEE Journal of Biomedical and Health Informatics.

[27]  Ali Azadeh,et al.  Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: The case of a gas refinery , 2008, Inf. Sci..

[28]  Jinjun Chen,et al.  An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud , 2013, J. Comput. Syst. Sci..

[29]  Andrew Lewis,et al.  Grasshopper Optimisation Algorithm: Theory and application , 2017, Adv. Eng. Softw..

[30]  Yan Li,et al.  Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan , 2016, Comput. Biol. Medicine.

[31]  Xiaohui Liang,et al.  Exploiting multimedia services in mobile social networks from security and privacy perspectives , 2014, IEEE Communications Magazine.

[32]  Il Kon Kim,et al.  CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System , 2016, IEEE Transactions on Services Computing.

[33]  P. Dhavachelvan,et al.  A secure data privacy preservation for on-demand cloud service , 2017 .

[34]  A. de Giorgio,et al.  The IARA Model as an Integrative Approach to Promote Autonomy in COPD Patients through Improvement of Self-Efficacy Beliefs and Illness Perception: A Mixed-Method Pilot Study , 2017, Front. Psychol..

[35]  Hong Yan,et al.  A Machine Learning Approach to Improve Contactless Heart Rate Monitoring Using a Webcam , 2014, IEEE Journal of Biomedical and Health Informatics.

[36]  Xiaodong Lin,et al.  SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.

[37]  Richard O. Sinnott,et al.  Semantic privacy-preserving framework for electronic health record linkage , 2017, Telematics Informatics.

[38]  Xiaoqian Jiang,et al.  Privacy Preserving RBF Kernel Support Vector Machine , 2014, BioMed research international.