A bio-inspired privacy-preserving framework for healthcare systems

Wireless computing has revolutionized our life with the technological advancement from the traditional networking into a new epoch for communication in ad hoc decorum. An energy efficient network of sensors based on wireless communication and networking principles can enhance the effectiveness of computing during unpredictable circumstances. If a computable required resource is readily available within the reachable region and it is identified to be idle and it is ready to share the corresponding information from its end without affecting the normal behavior of the device or the node, then there exists an opportunity to utilize those resources for computing. Opportunistic computing has a great potential of growth in the field of wireless ad hoc network computing. In traditional network computing technology, mobile computing, grid computing, distributed computing, ubiquitous computing and cloud computing, formerly ensues the communication with minimal resources currently available at the terminal point. This paper proposes a novel framework for an effective utilization of sharable resources, which are available within the reachable region, by creating an opportunity to frame an opportunistic computing while preserving the user’s privacy. The proposed framework adopts a bio-inspired technique for identifying and collecting resources information, and thereby recognizes which resource is ready to participate in the opportunistic computing. Experimental results of a system that implements the bio-inspired technique along with the natural behavior of the bee colony approach was analyzed and found that the proposed system shows comparatively high performance in terms of computation resource searching, identifying, emergency data transfer, and participative node privacy preserving.

[1]  Xiaolong Xu,et al.  Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems , 2019, Future Gener. Comput. Syst..

[2]  Pierre Pinson,et al.  A critical overview of privacy-preserving approaches for collaborative forecasting , 2021, International Journal of Forecasting.

[3]  L. D. Dhinesh Babu,et al.  Honey bee behavior inspired load balancing of tasks in cloud computing environments , 2013, Appl. Soft Comput..

[4]  Gang Liu,et al.  TPSense: A Framework for Event-Reports Trustworthiness Evaluation in Privacy-Preserving Vehicular Crowdsensing Systems , 2020 .

[5]  Manimaran Govindarasu,et al.  An Efficient Framework for Privacy-Preserving Computations on Encrypted IoT Data , 2020, IEEE Internet of Things Journal.

[6]  Dervis Karaboga,et al.  AN IDEA BASED ON HONEY BEE SWARM FOR NUMERICAL OPTIMIZATION , 2005 .

[7]  Mehran Abolhasan,et al.  PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities , 2020, Comput. Secur..

[8]  Keping Yu,et al.  A blockchain-empowered AAA scheme in the large-scale HetNet , 2020, Digit. Commun. Networks.

[9]  Yuanman Li,et al.  Privacy-Preserving distributed deep learning based on secret sharing , 2020, Inf. Sci..

[10]  Abdulrahman Alamer,et al.  An efficient truthfulness privacy-preserving tendering framework for vehicular fog computing , 2020, Eng. Appl. Artif. Intell..

[11]  Dongxi Liu,et al.  A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems , 2020, IEEE Transactions on Industrial Informatics.

[12]  Wei Wei,et al.  Fault-tolerant monitor placement for out-of-band wireless sensor network monitoring , 2012, Ad Hoc Networks.

[13]  Wenzhong Li,et al.  Energy saving strategies for cooperative cache replacement in mobile ad hoc networks , 2009, Pervasive Mob. Comput..

[14]  Xuefeng Zheng,et al.  User stateless privacy-preserving TPA auditing scheme for cloud storage , 2019, J. Netw. Comput. Appl..

[15]  Tirth Patel,et al.  Data privacy in construction industry by privacy-preserving data mining (PPDM) approach , 2020, Asian Journal of Civil Engineering.

[16]  Xiaodong Lin,et al.  SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.

[17]  Abderrazak Jemai,et al.  Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds , 2020, J. Parallel Distributed Comput..

[18]  Yin-Fu Huang,et al.  Global Data Allocation Based on User Behaviors in Mobile Computing Environments , 2006, 2006 International Symposium on Communications and Information Technologies.

[19]  Benjamin C. M. Fung,et al.  SecDM\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\textsf {SecDM}}$$\end{document}: privacy-preserving data outsou , 2019, Knowledge and Information Systems.

[20]  Yi Mu,et al.  Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid , 2020, IEEE Access.

[21]  Liang Gao,et al.  Honey bees mating optimization algorithm for process planning problem , 2014, J. Intell. Manuf..

[22]  Stan Kurkovsky Multimodality in Mobile Computing and Mobile Devices: Methods for Adaptable Usability , 2009 .

[23]  Nicolas Gama,et al.  Privacy-preserving semi-parallel logistic regression training with fully homomorphic encryption , 2020, BMC Medical Genomics.

[24]  Benjamin Turnbull,et al.  A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks , 2020, IEEE Transactions on Industrial Informatics.

[25]  Laurence T. Yang,et al.  Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives , 2020, Inf. Sci..

[26]  Bharat K. Bhargava,et al.  Performance Evaluation of Multiple-Rate Mobile Wireless Ad Hoc Networks , 2006 .

[27]  M.A.P. Chamikara,et al.  Privacy Preserving Face Recognition Utilizing Differential Privacy , 2020, Comput. Secur..

[28]  Golda Dilip,et al.  RETRACTED ARTICLE: An efficient privacy preserving on high-order heterogeneous data using fuzzy K-prototype clustering , 2020, Journal of Ambient Intelligence and Humanized Computing.

[29]  Yu Zhou,et al.  Privacy preserving distributed data mining based on secure multi-party computation , 2020, Comput. Commun..

[30]  Xun Yi,et al.  Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption , 2020, Eng. Appl. Artif. Intell..

[31]  Liuqing Yang,et al.  Sparse Vector Coding-Based Multi-Carrier NOMA for In-Home Health Networks , 2021, IEEE Journal on Selected Areas in Communications.

[32]  Yulei Wu,et al.  A privacy preserved and credible network protocol , 2019, J. Parallel Distributed Comput..

[33]  Sundaram Suresh,et al.  Meta-cognitive RBF Network and its Projection Based Learning algorithm for classification problems , 2013, Appl. Soft Comput..

[34]  Wouter Joosen,et al.  Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom , 2020, Inf. Syst. Frontiers.

[35]  Rongxing Lu,et al.  Adaptive privacy-preserving federated learning , 2020, Peer-to-Peer Networking and Applications.

[36]  Marcelo Dias de Amorim,et al.  Push-and-track: Saving infrastructure bandwidth through opportunistic forwarding , 2012, Pervasive Mob. Comput..

[37]  D. Chandramohan Bio comp A Bio inspired Opportunistic Computing Framework for Cooperative Problem Solving Environments , 2014 .

[38]  Keping Yu,et al.  Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV , 2020, IEEE Transactions on Vehicular Technology.

[39]  Leïla Azouz Saïdane,et al.  Privacy-preserving aware data transmission for IoT-based e-health , 2019, Comput. Networks.

[40]  Tasos Dagiuklas,et al.  Modeling human mobility in obstacle-constrained ad hoc networks , 2012, Ad Hoc Networks.

[41]  Guojun Wang,et al.  An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City , 2020, Comput. Electr. Eng..

[42]  Antonio F. Gómez-Skarmeta,et al.  ARIES: Evaluation of a reliable and privacy-preserving European identity management framework , 2020, Future Gener. Comput. Syst..

[43]  Nankun Mu,et al.  Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction , 2019, Comput. Secur..

[44]  Xuebin Ma,et al.  A privacy-preserving group decision making expert system for medical diagnosis based on dynamic knowledge base , 2020 .