Efficient access requests management for healthcare data with security and privacy-preserving

被引:0
|
作者
Kumar, Sandeep [1 ]
Shaw, Dilip Kumar [1 ]
机构
[1] Natl Inst Technol, Dept CSE, Jamshedpur 831014, Jharkhand, India
关键词
Recurrent and Convolution Layered Neural; Network (RCLNN); Standardized Padding Scheme (SPS) based hashing; Twisted Hessian Curve based data security; Blockchain; Access Control Cyber Policy;
D O I
10.1016/j.eswa.2024.126194
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data security and privacy-preserving are vital parts in the healthcare context for protecting confidential patient information, medical data, and history with local hospitals. Owing to single data type-based security, lack of policy-hiding strategies, and insider threats, conventional data security technology failed to guarantee data security. Thus, this work proposes a secure healthcare framework for ensuring the security of patient's healthcare data, realizing Access Control (AC) with the help of the data owner, and supporting normal and emergency scenarios. Primarily, to maintain secure data sharing, the patients are provided with a sub-secret during patient and doctor registration. After that, by utilizing the Recurrent and Convolution Layered Neural Network (RCLNN), the healthcare data is collected and categorized into two data types; then, the categorized data are encrypted using the Twisted Hessian Curve Cryptography (THCC) algorithm and Inversion Method (IM)-based embedding technique. Moreover, to provide authorization, an access policy is enforced. Hence, by utilizing the Standardized Padding Scheme-based Secure Hashing Algorithm-256 (SPS-SHA-256) algorithm, the AC policy is securely stored in the Blockchain (BC). Conversely, the user requests are classified using a Fuzzy Logic System (FLS) to provide controlled data access according to the risk evaluation and allow patients to define data access. Lastly, the outcomes displayed that for healthcare data security as well as privacy-preserving, the proposed AC model is highly secure and efficient.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Efficient Privacy-Preserving Data Mining in Malicious Model
    Emura, Keita
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I, 2010, 6440 : 370 - 382
  • [32] Efficient and Privacy-Preserving Data Aggregation in Mobile Sensing
    Li, Qinghua
    Cao, Guohong
    2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2012,
  • [33] Privacy-Preserving Healthcare Data Modeling Based on Sensitivity and Utility
    Saha S.
    Mallick S.
    Neogy S.
    SN Computer Science, 3 (6)
  • [34] Lightweight and Privacy-Preserving Agent Data Transmission for Mobile Healthcare
    Jiang, Shunrong
    Zhu, Xiaoyan
    Hao, Ripei
    Chi, Haotian
    Li, Hui
    Wang, Liangmin
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7322 - 7327
  • [35] Privacy-Preserving Heterogeneous Federated Learning for Sensitive Healthcare Data
    Xu, Yukai
    Zhang, Jingfeng
    Gu, Yujie
    2024 IEEE CONFERENCE ON ARTIFICIAL INTELLIGENCE, CAI 2024, 2024, : 1142 - 1147
  • [36] A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework
    Yang, Huijie
    Zhou, Tianqi
    Wang, Chen
    He, Debiao
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 374 - 391
  • [37] Survey on Privacy-Preserving and Other Security Issues in Data Mining
    Karthika, K.
    Priya, R. Devi
    Sathishkumar, S.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 849 - 858
  • [38] On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification
    Li, Xingxin
    Zhu, Youwen
    Wang, Jian
    Liu, Zhe
    Liu, Yining
    Zhang, Mingwu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 906 - 912
  • [39] Overview of the data security and privacy-preserving of mobile cloud services
    Gu, X.-W. (guxiwu@hust.edu.cn), 1600, Editorial Board of Journal on Communications (34):
  • [40] Lightweight and Privacy-Preserving Data Aggregation for Mobile Multimedia Security
    Ma, Sugang
    Zhang, Tiantian
    Wu, Axin
    Zhao, Xiangmo
    IEEE ACCESS, 2019, 7 : 114131 - 114140