Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

19-02-2020

An Optimized Integrated Framework of Big Data Analytics Managing Security and Privacy in Healthcare Data

Authors: Ritu Chauhan, Harleen Kaur, Victor Chang

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Big data analytics has anonymously changed the overall global scenario to discover knowledge trends for future decision making. In general, potential area of big data application tends to be healthcare, where the global burden is to improve patient diagnostic system and providing patterns to assure the privacy of the end users. However, data constraints exists on real data which needs to be accessed while preserving the security of patients for further diagnostic analysis. This advancement in big data needs to addressed where the patient right needs to maintained while the disclosure of knowledge discovery for future needs are also addressed. To, embark and acknowledge the big data environment its adherently important to determine the cutting-edge research which can benefit end users and healthcare practioners to discover overall prognosis and diagnosis of disease while maintaining the concerns for privacy and security of patient data. In current state of art, we tried to address the big data analytics approach while maintain privacy of healthcare databases for future knowledge discovery. The current objective was to design and develop a novel framework which can integrate the big data with privacy and security concerns and determine knowledgably patterns for future decision making. In the current study we have utilized big data analytical technique for patients suffering from Human Immunodeficiency Virus (HIV) and Tuberculosis (TB) coinfection to develop trends and detect patterns with socio economic factors. Further, a novel framework was implemented using unsupervised learning technique in STATA and MATLAB 7.1 to develop patterns for knowledge discovery process while maintain the privacy and security of data. The study overall can benefit end users to predict future prognosis of disease and combinatorial effects to determining varied policies which can assist patients with needs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in big data: Privacy and data mining. Journal of Rapid Open Access Publication, 2, 1149–1176. Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in big data: Privacy and data mining. Journal of Rapid Open Access Publication, 2, 1149–1176.
2.
go back to reference Yu, W. D., Kollipara, M., Penmetsa, R., & Elliadka, S. (2013). A distributed storage solution for cloud based e-Healthcare Information System. In Proceedings of the IEEE 15th international conference on e-health networking, applications & services (Healthcom’13); Lisbon, Portugal (pp. 476–480). Yu, W. D., Kollipara, M., Penmetsa, R., & Elliadka, S. (2013). A distributed storage solution for cloud based e-Healthcare Information System. In Proceedings of the IEEE 15th international conference on e-health networking, applications & services (Healthcom’13); Lisbon, Portugal (pp. 476–480).
3.
go back to reference Athey, B. D., Braxenthaler, M., Haas, M., & Guo, Y. (2013). Transmart: An open source and community-driven informatics and data sharing platform for clinical and translational research. AMIA Summits on Translational Science Proceedings, 2013, 6–8. Athey, B. D., Braxenthaler, M., Haas, M., & Guo, Y. (2013). Transmart: An open source and community-driven informatics and data sharing platform for clinical and translational research. AMIA Summits on Translational Science Proceedings, 2013, 6–8.
4.
go back to reference Jeanquartier, F., & Holzinger, A. (2013). On visual analytics and evaluation in cell physiology: A case study. In A. Cuzzocrea, C. Kittl, D. E. Simos, E. Weippl, & L. Xu (Eds.), Availability, reliability, and security in information systems and HCI (pp. 495–502). Berlin: Springer.CrossRef Jeanquartier, F., & Holzinger, A. (2013). On visual analytics and evaluation in cell physiology: A case study. In A. Cuzzocrea, C. Kittl, D. E. Simos, E. Weippl, & L. Xu (Eds.), Availability, reliability, and security in information systems and HCI (pp. 495–502). Berlin: Springer.CrossRef
5.
go back to reference Jiang, M., Zhang, S., Li, H., & Metaxas, D. N. (2015). Computer-aided diagnosis of mammographic masses using scalable image retrieval. IEEE Transactions on Biomedical Engineering, 62(2), 783–792.CrossRef Jiang, M., Zhang, S., Li, H., & Metaxas, D. N. (2015). Computer-aided diagnosis of mammographic masses using scalable image retrieval. IEEE Transactions on Biomedical Engineering, 62(2), 783–792.CrossRef
6.
go back to reference Johnston, M. E., Langton, K. B., Brian Haynes, R., & Mathieu, A. (1994). Effects of computer-based clinical decision support systems on clinician performance and patient outcome: A critical appraisal of research. Annals of Internal Medicine, 120(2), 135–142.CrossRef Johnston, M. E., Langton, K. B., Brian Haynes, R., & Mathieu, A. (1994). Effects of computer-based clinical decision support systems on clinician performance and patient outcome: A critical appraisal of research. Annals of Internal Medicine, 120(2), 135–142.CrossRef
7.
go back to reference Jung, K., LePendu, P., Iyer, S., Bauer-Mehren, A., Percha, B., & Shah, N. H. (2014). Functional evaluation of out-of-the-box text-mining tools for data-mining tasks. Journal of the American Medical Informatics Association, 22(1), 121–131.CrossRef Jung, K., LePendu, P., Iyer, S., Bauer-Mehren, A., Percha, B., & Shah, N. H. (2014). Functional evaluation of out-of-the-box text-mining tools for data-mining tasks. Journal of the American Medical Informatics Association, 22(1), 121–131.CrossRef
9.
go back to reference Asha, T., Natarajan, S., & Murthy, K. N. B. (2011). A data mining approach to the diagnosis of tuberculosis by cascading clustering and classification. Journal of Computing 3 arXiv:1108.1045 [cs.AI]. Asha, T., Natarajan, S., & Murthy, K. N. B. (2011). A data mining approach to the diagnosis of tuberculosis by cascading clustering and classification. Journal of Computing 3 arXiv:​1108.​1045 [cs.AI].
10.
go back to reference Uçar, T., & Karahoca, A. (2011). Predicting existence of Mycobacterium tuberculosis on patients using data mining approaches. Procedia Computer Science, 3, 1404–1411.CrossRef Uçar, T., & Karahoca, A. (2011). Predicting existence of Mycobacterium tuberculosis on patients using data mining approaches. Procedia Computer Science, 3, 1404–1411.CrossRef
11.
go back to reference Garg, S., & Rupal, N. (2015). A review on tuberculosis using data mining approaches. International Journal of Engineering Development and Research, 3(3), 1–4. Garg, S., & Rupal, N. (2015). A review on tuberculosis using data mining approaches. International Journal of Engineering Development and Research, 3(3), 1–4.
12.
go back to reference Kambatla, K., Kollias, G., Kumar, V., & Grama, A. (2014). Trends in big data analytics. Journal of Parallel and Distributed Computing, 74(7), 2561–2573.CrossRef Kambatla, K., Kollias, G., Kumar, V., & Grama, A. (2014). Trends in big data analytics. Journal of Parallel and Distributed Computing, 74(7), 2561–2573.CrossRef
13.
go back to reference Kawamoto, K., Houlihan, C. A., Andrew Balas, E., & Lobach, D. F. (2005). Improving clinical practice using clinical decision support systems: A systematic review of trials to identify features critical to success. BMJ, 330(7494), 765.CrossRef Kawamoto, K., Houlihan, C. A., Andrew Balas, E., & Lobach, D. F. (2005). Improving clinical practice using clinical decision support systems: A systematic review of trials to identify features critical to success. BMJ, 330(7494), 765.CrossRef
14.
go back to reference Keim, D. A. (2002). Information visualization and visual data mining. IEEE Transactions on Visualization and Computer Graphics, 8(1), 1–8.MathSciNetCrossRef Keim, D. A. (2002). Information visualization and visual data mining. IEEE Transactions on Visualization and Computer Graphics, 8(1), 1–8.MathSciNetCrossRef
15.
go back to reference Metcalfe, J. Z., Porco, T. C., Westenhouse, J., Damesyn, M., Facer, M., Hill, J., et al. (2013). Tuberculosis and HIV co-infection, California, USA, 1993–2008. Emerging Infectious Diseases, 19(3), 400. Metcalfe, J. Z., Porco, T. C., Westenhouse, J., Damesyn, M., Facer, M., Hill, J., et al. (2013). Tuberculosis and HIV co-infection, California, USA, 1993–2008. Emerging Infectious Diseases, 19(3), 400.
16.
go back to reference Kim, S.-H., Kim, N.-U., & Chung, T.-M. (2013). Attribute relationship evaluation methodology for big data security. In 2013 international conference on IT convergence and security (ICITCS), IEEE (pp. 1–4). Kim, S.-H., Kim, N.-U., & Chung, T.-M. (2013). Attribute relationship evaluation methodology for big data security. In 2013 international conference on IT convergence and security (ICITCS), IEEE (pp. 1–4).
17.
go back to reference Rama Lakshmi, K., & Prem Kumar, S. (2013). Utilisation of data mining techniques for prediction and diagnosis of major life threatening diseases survivability-review. International Journal for Scientific and Engineering Research, 4(6), 923–932. Rama Lakshmi, K., & Prem Kumar, S. (2013). Utilisation of data mining techniques for prediction and diagnosis of major life threatening diseases survivability-review. International Journal for Scientific and Engineering Research, 4(6), 923–932.
20.
go back to reference Sánchez, M. A., Uremovich, S., & Acrogliano, P. (2009). Mining Tuberculosis Data. In P. Berka, J. Rauch, & D. A. Zighed (Eds.), Data mining and medical knowledge management: Cases and applications. New York: Medical Information Science Reference. Sánchez, M. A., Uremovich, S., & Acrogliano, P. (2009). Mining Tuberculosis Data. In P. Berka, J. Rauch, & D. A. Zighed (Eds.), Data mining and medical knowledge management: Cases and applications. New York: Medical Information Science Reference.
21.
go back to reference Han, W., Susilo, Y., & Yan, J. (2012). Privacy preserving decentralized key-policy attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 23, 2150–2162.CrossRef Han, W., Susilo, Y., & Yan, J. (2012). Privacy preserving decentralized key-policy attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 23, 2150–2162.CrossRef
22.
go back to reference Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012). Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems (pp. 1097–1105). Curran Associates. Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012). Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems (pp. 1097–1105). Curran Associates.
23.
go back to reference Labrinidis, A., & Jagadish, H. V. (2012). Challenges and opportunities with big data. Proceedings of the VLDB Endowment, 5(12), 2032–2033.CrossRef Labrinidis, A., & Jagadish, H. V. (2012). Challenges and opportunities with big data. Proceedings of the VLDB Endowment, 5(12), 2032–2033.CrossRef
24.
go back to reference Lalys, F., Riffaud, L., Bouget, D., & Jannin, P. (2012). A framework for the recognition of high-level surgical tasks from video images for cataract surgeries. IEEE Transactions on Biomedical Engineering, 59(4), 966–976.CrossRef Lalys, F., Riffaud, L., Bouget, D., & Jannin, P. (2012). A framework for the recognition of high-level surgical tasks from video images for cataract surgeries. IEEE Transactions on Biomedical Engineering, 59(4), 966–976.CrossRef
25.
go back to reference Langs, G., Hanbury, A., Menze, B., & Muller, H. (2013). VISCERAL: Towards large data in medical imaging challenges and directions. In Medical content-based retrieval for clinical decision support (Vol. 7723, pp. 92–98). Springer. Langs, G., Hanbury, A., Menze, B., & Muller, H. (2013). VISCERAL: Towards large data in medical imaging challenges and directions. In Medical content-based retrieval for clinical decision support (Vol. 7723, pp. 92–98). Springer.
26.
go back to reference Yazan, A., Yong, W., & Raj Kumar, N. (2015). Big data life cycle: Threats and security model. In: 21st Americas conference on information systems. Yazan, A., Yong, W., & Raj Kumar, N. (2015). Big data life cycle: Threats and security model. In: 21st Americas conference on information systems.
27.
go back to reference Greenleaf, Graham and Chung, Philip and Mowbray, Andrew, Influencing Data Privacy Practices By Global Free Access: The International Privacy Law Library (November 14, 2014). UNSW Law Research Paper No. 2014-56. Greenleaf, Graham and Chung, Philip and Mowbray, Andrew, Influencing Data Privacy Practices By Global Free Access: The International Privacy Law Library (November 14, 2014). UNSW Law Research Paper No. 2014-56. 
28.
go back to reference OECD. (2013). Data-driven healthcare innovation, management and policy, DELSA/HEA(2013) 13. Paris: OECD. OECD. (2013). Data-driven healthcare innovation, management and policy, DELSA/HEA(2013) 13. Paris: OECD.
29.
go back to reference Chauhan, R., & Kaur, H. (2017). A feature based reduction technique on large scale databases. International Journal of Data Analysis Techniques and Strategies., 9(3), 207–221.CrossRef Chauhan, R., & Kaur, H. (2017). A feature based reduction technique on large scale databases. International Journal of Data Analysis Techniques and Strategies., 9(3), 207–221.CrossRef
32.
go back to reference Chauhan, R., & Kaur, H. (2015). Big data application in medical domain. In D. P. Acharjya, et al. (Eds.), Computational intelligence for big data analysis: Frontier advances and applications. Volume 19 of the series adaptation, learning, and optimization (pp. 165–179). Basel: Springer.CrossRef Chauhan, R., & Kaur, H. (2015). Big data application in medical domain. In D. P. Acharjya, et al. (Eds.), Computational intelligence for big data analysis: Frontier advances and applications. Volume 19 of the series adaptation, learning, and optimization (pp. 165–179). Basel: Springer.CrossRef
33.
go back to reference Kaur, H., Tao, X. (2014). ICT and Millennium Development Goals: A United Nations Perspective, pp. 271, Springer, New York. Kaur, H., Tao, X. (2014).  ICT and Millennium Development Goals: A United Nations Perspective, pp. 271, Springer, New York.
34.
go back to reference Chauhan, R., Kaur, H., Lechman, E., Marszk, A. (2017). Big data analytics for ICT monitoring and development. In: Kaur, H., et al. (eds.) Catalyzing Development Through ICT Adoption: The Developing World Experience, pp. 25–36. Springer, New York.CrossRef Chauhan, R., Kaur, H., Lechman, E., Marszk, A. (2017). Big data analytics for ICT monitoring and development. In: Kaur, H., et al. (eds.) Catalyzing Development Through ICT Adoption: The Developing World Experience, pp. 25–36. Springer, New York.CrossRef
35.
go back to reference Hu, P., & Gao, H. (2017). A key-policy attribute-based encryption scheme for general circuit from bilinear maps. International Journal Network Security, 19(5), 704–710. Hu, P., & Gao, H. (2017). A key-policy attribute-based encryption scheme for general circuit from bilinear maps. International Journal Network Security, 19(5), 704–710.
36.
go back to reference Lai, J., Deng, R. H., Guan, C., & Weng, J. (2013). Attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 8(8), 1343–1354.CrossRef Lai, J., Deng, R. H., Guan, C., & Weng, J. (2013). Attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 8(8), 1343–1354.CrossRef
37.
go back to reference Lee, C. C., Chung, P. S., & Hwang, M. S. (2013). A survey on attribute-based encryption schemes of access control in cloud environments. International Journal Network Security, 15, 231–240. Lee, C. C., Chung, P. S., & Hwang, M. S. (2013). A survey on attribute-based encryption schemes of access control in cloud environments. International Journal Network Security, 15, 231–240.
38.
go back to reference Lewis, G., Echeverria, S., Simanta, S., Bradshaw, B., & Root, J. (2014). Tactical cloudlets: Moving cloud computing to the edge. In IEEE military communications conference (pp. 1440–1446). Lewis, G., Echeverria, S., Simanta, S., Bradshaw, B., & Root, J. (2014). Tactical cloudlets: Moving cloud computing to the edge. In IEEE military communications conference (pp. 1440–1446).
39.
go back to reference Li, J., Huang, X., Li, J., Chen, X., & Xiang, Y. (2014). Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems, 25(8), 2201–2210.CrossRef Li, J., Huang, X., Li, J., Chen, X., & Xiang, Y. (2014). Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems, 25(8), 2201–2210.CrossRef
40.
go back to reference Agarwal, S., Nguyen, D. T., Teeter, L. D., & Graviss, E. A. (2017). Spatial-temporal distribution of genotyped tuberculosis cases in a county with active transmission. BMC Infectious Diseases, 17, 378.CrossRef Agarwal, S., Nguyen, D. T., Teeter, L. D., & Graviss, E. A. (2017). Spatial-temporal distribution of genotyped tuberculosis cases in a county with active transmission. BMC Infectious Diseases, 17, 378.CrossRef
42.
go back to reference Li, J., Yao, W., Zhang, Y., Qian, H., & Han, J. (2017). Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Transactions on Services Computing, 10(5), 785–796.CrossRef Li, J., Yao, W., Zhang, Y., Qian, H., & Han, J. (2017). Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Transactions on Services Computing, 10(5), 785–796.CrossRef
Metadata
Title
An Optimized Integrated Framework of Big Data Analytics Managing Security and Privacy in Healthcare Data
Authors
Ritu Chauhan
Harleen Kaur
Victor Chang
Publication date
19-02-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07040-8

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue