Medical Image Detection & Privacy Management With Elliptic Curve GOPSO Cryptographic Optimization Technique on the Internet of Health Things

The advent of the Internet of Things (IoT) is to transform the health care sector and lead to the development of the Internet of Health Things (IoHT). This technology exceeds existing human services mechanically, financially, and socially. This paper used an advanced cryptographic framework that includes optimization strategies to look at IoHT medical image protection. The patient data kept on a cloud server which was detected and sensed from the IoHT Healthcare devices. It's critical to ensure the safety and privacy of patient clinical images in the cloud; here, an enhanced security framework for health information promotes trust. Next, we presented health care providers who could provide the full range of medical facilities for IoHT participants. In the process of encrypting/decrypting elliptical curves, the optimal key is selected using the Grasshopper Particle Swarm Optimization (GOPSO) to increase the security standard of medical images. Medical images are protected within IoHT by using this approach.The implementation results were analyzed and compared with a variety of encryption algorithms and their optimization techniques. The effectiveness of the proposed methods and the results show that the medical image is secure and prevents attacks in IoHT-based health care systems.

[1]  Mingzhe Jiang,et al.  Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..

[2]  Bram van Ginneken,et al.  A survey on deep learning in medical image analysis , 2017, Medical Image Anal..

[3]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[4]  Jose Dolz,et al.  3D fully convolutional networks for subcortical segmentation in MRI: A large-scale study , 2016, NeuroImage.

[5]  Mohsen Guizani,et al.  The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.

[6]  Mohamed Elhoseny,et al.  Trust-based secure clustering in WSN-based intelligent transportation systems , 2018, Comput. Networks.

[7]  T. P. Latchoumi,et al.  UIP—A Smart Web Application to Manage Network Environments , 2020 .

[8]  Yao Lu,et al.  RIC-Unet: An Improved Neural Network Based on Unet for Nuclei Segmentation in Histology Images , 2019, IEEE Access.

[9]  Dinesh Mavaluru,et al.  Brain–computer interface for amyotrophic lateral sclerosis patients using deep learning network , 2020, Neural Computing and Applications.

[10]  Alfredo De Santis,et al.  On the protection of consumer genomic data in the Internet of Living Things , 2017, Comput. Secur..

[11]  Andrew Zisserman,et al.  A Statistical Approach to Material Classification Using Image Patch Exemplars , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[12]  A Elsir,et al.  Privacy Preservation in Big Data with Data Scalability and Efficiency Using Efficient and Secure Data Balanced Scheduling Algorithm , 2019 .

[13]  Colin Tankard,et al.  The security issues of the Internet of Things , 2015 .

[14]  Kyung Sup Kwak,et al.  An Internet of Things-based health prescription assistant and its security system design , 2017, Future Gener. Comput. Syst..

[15]  Sun-Yuan Kung,et al.  Multi-Kernel, Deep Neural Network and Hybrid Models for Privacy Preserving Machine Learning , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[16]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[17]  T. P. Latchoumi,et al.  Bio-inspired weighed quantum particle swarm optimization and smooth support vector machine ensembles for identification of abnormalities in medical data , 2019, SN Applied Sciences.