Efficient access requests management for healthcare data with security and privacy-preserving

被引:0
|
作者
Kumar, Sandeep [1 ]
Shaw, Dilip Kumar [1 ]
机构
[1] Natl Inst Technol, Dept CSE, Jamshedpur 831014, Jharkhand, India
关键词
Recurrent and Convolution Layered Neural; Network (RCLNN); Standardized Padding Scheme (SPS) based hashing; Twisted Hessian Curve based data security; Blockchain; Access Control Cyber Policy;
D O I
10.1016/j.eswa.2024.126194
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data security and privacy-preserving are vital parts in the healthcare context for protecting confidential patient information, medical data, and history with local hospitals. Owing to single data type-based security, lack of policy-hiding strategies, and insider threats, conventional data security technology failed to guarantee data security. Thus, this work proposes a secure healthcare framework for ensuring the security of patient's healthcare data, realizing Access Control (AC) with the help of the data owner, and supporting normal and emergency scenarios. Primarily, to maintain secure data sharing, the patients are provided with a sub-secret during patient and doctor registration. After that, by utilizing the Recurrent and Convolution Layered Neural Network (RCLNN), the healthcare data is collected and categorized into two data types; then, the categorized data are encrypted using the Twisted Hessian Curve Cryptography (THCC) algorithm and Inversion Method (IM)-based embedding technique. Moreover, to provide authorization, an access policy is enforced. Hence, by utilizing the Standardized Padding Scheme-based Secure Hashing Algorithm-256 (SPS-SHA-256) algorithm, the AC policy is securely stored in the Blockchain (BC). Conversely, the user requests are classified using a Fuzzy Logic System (FLS) to provide controlled data access according to the risk evaluation and allow patients to define data access. Lastly, the outcomes displayed that for healthcare data security as well as privacy-preserving, the proposed AC model is highly secure and efficient.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Efficient and Privacy-Preserving Access to Sensor Data for Internet of Things (IoT) based Services
    Appavoo, Paramasiven
    Chan, Mun Choon
    Bhojan, Anand
    Chang, Ee-Chien
    2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [22] AI in Healthcare Data Privacy-Preserving: Enhanced Trade-Off Between Security and Utility
    Peng, Lian
    Qiu, Meikang
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT III, KSEM 2024, 2024, 14886 : 349 - 360
  • [23] Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 880 - 893
  • [24] Efficient paillier cryptoprocessor for privacy-preserving data mining
    San, Ismail
    At, Nuray
    Yakut, Ibrahim
    Polat, Huseyin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1535 - 1546
  • [25] Efficient Privacy-Preserving Multicast in Cloud Data Centers
    Li, He
    Li, Peng
    Guo, Song
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 810 - 815
  • [26] Efficient and Privacy-Preserving Query on Outsourced Spherical Data
    Zhou, Yueyue
    Xiang, Tao
    Li, Xiaoguo
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 138 - 152
  • [27] A secure and efficient privacy-preserving data aggregation algorithm
    Hui Dou
    Yuling Chen
    Yixian Yang
    Yangyang Long
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 1495 - 1503
  • [28] Efficient Privacy-Preserving Aggregation Scheme for Data Sets
    Sherif, Ahmed
    Alsharif, Ahmad
    Mahmoud, Mohamed
    Abdallah, Mohamed
    Song, Min
    2018 25TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2018, : 191 - 195
  • [29] A secure and efficient privacy-preserving data aggregation algorithm
    Dou, Hui
    Chen, Yuling
    Yang, Yixian
    Long, Yangyang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (03) : 1495 - 1503
  • [30] An Efficient Privacy-Preserving Data Aggregation Scheme for IoT
    Hu, Chunqiang
    Luo, Jin
    Pu, Yuwen
    Yu, Jiguo
    Zhao, Ruifeng
    Huang, Hongyu
    Xiang, Tao
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018), 2018, 10874 : 164 - 176