Skip to main content
Top
Published in: Evolutionary Intelligence 1-2/2018

16-08-2018 | Special Issue

Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector

Authors: M. M. Annie Alphonsa, P. Amudhavalli

Published in: Evolutionary Intelligence | Issue 1-2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing is a computing paradigm that provides vibrant accessible infrastructure for data, application and file storage as well. This technology advancement benefits in a significant lessening of consumption cost, application hosting, content storage as well as delivery, and hence the concept appear gradually more in all entities that exploited in the healthcare sector. Under such circumstances, efficient analysis and data extraction from a cloud environment is more challenging. Moreover, the extracted data has to be preserved for privacy. To handle these challenges, this paper has come out with a privacy-preserving algorithm in both data sanitization and data restoration process. Further, several researchers have contributed advancement in the restoration process, yet the accuracy of restoration seems to be very low. As a solution to this problem, this paper uses a hybrid algorithm termed as genetically modified glowworm swarm for both data sanitization and data restoration process. Further, the developed hybridization model compares its performance with other conventional models like conventional glowworm swarm optimization, firefly, particle swarm optimization, artificial bee colony, crow search, group search optimization and genetic algorithm in terms of statistical analysis, sanitization and restoration effectiveness, convergence analysis and key sensitivity analysis, and the dominance of the developed model is proved.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sahi A, Lai D, Li Y (2016) Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Comput Biol Med 78:1–8CrossRef Sahi A, Lai D, Li Y (2016) Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Comput Biol Med 78:1–8CrossRef
2.
go back to reference Zhou J, Cao Z, Dong X, Lin X (2015) PPDM: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J Select Top Signal Process 9(7):1332–1344CrossRef Zhou J, Cao Z, Dong X, Lin X (2015) PPDM: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J Select Top Signal Process 9(7):1332–1344CrossRef
3.
go back to reference Gatzoulis L, Iakovidis I (2007) Wearable and portable ehealth systems. IEEE Eng Med Biol Mag 26(5):51–56CrossRef Gatzoulis L, Iakovidis I (2007) Wearable and portable ehealth systems. IEEE Eng Med Biol Mag 26(5):51–56CrossRef
4.
go back to reference Takabi H, Joshi JBD, Ahn GJ (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24–31CrossRef Takabi H, Joshi JBD, Ahn GJ (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24–31CrossRef
5.
go back to reference Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gen Comput Syst 28(3):583–592CrossRef Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gen Comput Syst 28(3):583–592CrossRef
6.
go back to reference Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud computing vulnerabilities. IEEE Secur Priv 9(2):50–57CrossRef Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud computing vulnerabilities. IEEE Secur Priv 9(2):50–57CrossRef
7.
go back to reference Zhang K, Liang X, Shen X, Lu R (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun Mag 52(3):58–65CrossRef Zhang K, Liang X, Shen X, Lu R (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun Mag 52(3):58–65CrossRef
8.
go back to reference Liu X, Lu R, Ma J, Chen L, Qin B (2016) Privacy-preserving patient-centric clinical decision support system on naïve bayesian classification. IEEE J Biomed Health Inf 20(2):655–668CrossRef Liu X, Lu R, Ma J, Chen L, Qin B (2016) Privacy-preserving patient-centric clinical decision support system on naïve bayesian classification. IEEE J Biomed Health Inf 20(2):655–668CrossRef
9.
go back to reference Barua M, Liang X, Lu R, Shen X (2011) ESPAC: enabling security and patient-centric access control for ehealth in cloud computing. Int J Secur Netw 6(2–3):67–76 Barua M, Liang X, Lu R, Shen X (2011) ESPAC: enabling security and patient-centric access control for ehealth in cloud computing. Int J Secur Netw 6(2–3):67–76
10.
go back to reference Viswanathan H, Chen B, Pompili D (2012) Research challenges in computation, communication, and context awareness for ubiquitous healthcare. IEEE Commun Mag 50(5):92–99CrossRef Viswanathan H, Chen B, Pompili D (2012) Research challenges in computation, communication, and context awareness for ubiquitous healthcare. IEEE Commun Mag 50(5):92–99CrossRef
11.
go back to reference Lee SH, Song JH, Kim IK (2016) CDA generation and integration for health information exchange based on cloud computing system. IEEE Trans Serv Comput 9(2):241–249CrossRef Lee SH, Song JH, Kim IK (2016) CDA generation and integration for health information exchange based on cloud computing system. IEEE Trans Serv Comput 9(2):241–249CrossRef
12.
go back to reference Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542–555MathSciNetCrossRef Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542–555MathSciNetCrossRef
13.
go back to reference Azadeh A, Fam IM, Khoshnoud M, Nikafrouz M (2008) Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: the case of a gas refinery. Inf Sci 178(22):4280–4300,CrossRef Azadeh A, Fam IM, Khoshnoud M, Nikafrouz M (2008) Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: the case of a gas refinery. Inf Sci 178(22):4280–4300,CrossRef
14.
go back to reference Zhang K, Liang X, Baura M, Lu R, (Sherman)Shen X (2014) PHDA: a priority based health data aggregation with privacy preservation for cloud assisted WBANs. Inf Sci 284:130–141MathSciNet Zhang K, Liang X, Baura M, Lu R, (Sherman)Shen X (2014) PHDA: a priority based health data aggregation with privacy preservation for cloud assisted WBANs. Inf Sci 284:130–141MathSciNet
15.
go back to reference Wang W, Chen L, Zhang Q (2015) Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput Netw 88:136–148CrossRef Wang W, Chen L, Zhang Q (2015) Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput Netw 88:136–148CrossRef
16.
go back to reference Iakovidis I (1998) Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare record in Europe. Int J Med Inf 52(1–3):105–115 Iakovidis I (1998) Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare record in Europe. Int J Med Inf 52(1–3):105–115
17.
go back to reference Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef
18.
go back to reference Li H, Xiong L, Ohno-Machado L, Jiang X (2014) Privacy preserving RBF kernel support vector machine. BioMed Res Int 2014:1–10 Li H, Xiong L, Ohno-Machado L, Jiang X (2014) Privacy preserving RBF kernel support vector machine. BioMed Res Int 2014:1–10
19.
go back to reference Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In: 2010 Proceedings IEEE INFOCOM, pp 1–9 Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In: 2010 Proceedings IEEE INFOCOM, pp 1–9
20.
go back to reference Shi E, Chan T, Rieffel E, Chow R, Song D (2011) Privacy-preserving aggregation of time-series data. In: Proceedings of NDSS Shi E, Chan T, Rieffel E, Chow R, Song D (2011) Privacy-preserving aggregation of time-series data. In: Proceedings of NDSS
21.
go back to reference Shi J, Zhang R, Liu Y, Zhang Y (2010) PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. In: 2010 Proceedings IEEE INFOCOM, San Diego, CA, pp 1–9 Shi J, Zhang R, Liu Y, Zhang Y (2010) PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. In: 2010 Proceedings IEEE INFOCOM, San Diego, CA, pp 1–9
22.
go back to reference Kumar BSS, Manjunath AS, Christopher S (2018) Improved entropy encoding for high efficient video coding standard. Alexandria Eng J 57(1):1–9CrossRef Kumar BSS, Manjunath AS, Christopher S (2018) Improved entropy encoding for high efficient video coding standard. Alexandria Eng J 57(1):1–9CrossRef
23.
go back to reference Kota PN, Gaikwad AN (2017) Optimized scrambling sequence to reduce papr in space frequency block codes based MIMO-OFDM system. J Adv Res Dyn Control Syst:502–525 Kota PN, Gaikwad AN (2017) Optimized scrambling sequence to reduce papr in space frequency block codes based MIMO-OFDM system. J Adv Res Dyn Control Syst:502–525
24.
go back to reference Bhatnagar K, Gupta S (2017) Extending the neural model to study the impact of effective area of optical fiber on laser intensity. Int J Intell Eng Syst 10(4):274–283CrossRef Bhatnagar K, Gupta S (2017) Extending the neural model to study the impact of effective area of optical fiber on laser intensity. Int J Intell Eng Syst 10(4):274–283CrossRef
25.
go back to reference Balaji GN, Subashini TS, Chidambaram N (2015) Detection of heart muscle damage from automated analysis of echocardiogram video. IETE J Res 61(3):236–243CrossRef Balaji GN, Subashini TS, Chidambaram N (2015) Detection of heart muscle damage from automated analysis of echocardiogram video. IETE J Res 61(3):236–243CrossRef
26.
go back to reference Bramhe SS, Dalal A, Tajne D, Marotkar D (2015) Glass shaped antenna with defected ground structure for cognitive radio application. In: International conference on computing communication control and automation, Pune, pp 330–333 Bramhe SS, Dalal A, Tajne D, Marotkar D (2015) Glass shaped antenna with defected ground structure for cognitive radio application. In: International conference on computing communication control and automation, Pune, pp 330–333
27.
go back to reference Waqar A, Raza A, Abbas H, Khan MK (2013) A framework for preservation of cloudusers’data privacy using dynamic reconstruction of metadata. J Netw Comput Appl 36:235–248CrossRef Waqar A, Raza A, Abbas H, Khan MK (2013) A framework for preservation of cloudusers’data privacy using dynamic reconstruction of metadata. J Netw Comput Appl 36:235–248CrossRef
28.
go back to reference Nallakumar MR, Sengottaiyan N, MohamedArif M (2014) Cloud computing and methods for privacy preservation: a survey. IJARCET 3(11) Nallakumar MR, Sengottaiyan N, MohamedArif M (2014) Cloud computing and methods for privacy preservation: a survey. IJARCET 3(11)
29.
go back to reference Yarrapragada KSSR, Krishna BB Impact of tamanu oil-diesel blend on combustion, performance and emissions of diesel engine and its prediction methodology. J Braz Soc Mech Sci Eng:1–15 Yarrapragada KSSR, Krishna BB Impact of tamanu oil-diesel blend on combustion, performance and emissions of diesel engine and its prediction methodology. J Braz Soc Mech Sci Eng:1–15
30.
go back to reference Sreedharan N, Preetha N, Ganesan B, Raveendran R, Sarala P, Dennis B, Rajakumar Boothalingam R (2018) Grey Wolf optimisation-based feature selection and classification for facial emotion recognition. IET Biometr Sreedharan N, Preetha N, Ganesan B, Raveendran R, Sarala P, Dennis B, Rajakumar Boothalingam R (2018) Grey Wolf optimisation-based feature selection and classification for facial emotion recognition. IET Biometr
31.
go back to reference Sarkar A, Murugan TS (2017) Cluster head selection for energy efficient and delay-less routing in wireless sensor network. Wirel Netw:1–18 Sarkar A, Murugan TS (2017) Cluster head selection for energy efficient and delay-less routing in wireless sensor network. Wirel Netw:1–18
32.
go back to reference Wagh AM, Todmal SR (2015) Eyelids, eyelashes detection algorithm and hough transform method for noise removal in iris recognition. Int J Comput Appl 112(3):28–31 Wagh AM, Todmal SR (2015) Eyelids, eyelashes detection algorithm and hough transform method for noise removal in iris recognition. Int J Comput Appl 112(3):28–31
33.
go back to reference Iyapparaja M, Tiwari M (2017) Security policy speculation of user uploaded images on content sharing sites. IOP Conf Ser Mater Sci Eng 263(4):042019CrossRef Iyapparaja M, Tiwari M (2017) Security policy speculation of user uploaded images on content sharing sites. IOP Conf Ser Mater Sci Eng 263(4):042019CrossRef
34.
go back to reference Chandramohan D, Vengattaraman T, Dhavachelvan P (2017) A secure data privacy preservation for on-demand cloud service. J King Saud Univ Eng Sci 29(2):144–150 Chandramohan D, Vengattaraman T, Dhavachelvan P (2017) A secure data privacy preservation for on-demand cloud service. J King Saud Univ Eng Sci 29(2):144–150
35.
go back to reference Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145CrossRef Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145CrossRef
36.
go back to reference Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Rep 39:51–57 Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Rep 39:51–57
37.
go back to reference Wu B, Qian C, Ni W, Fan S (2012) The improvement of glowworm swarm optimization for continuous optimization problems. Expert Syst Appl 39(7):6335–6342CrossRef Wu B, Qian C, Ni W, Fan S (2012) The improvement of glowworm swarm optimization for continuous optimization problems. Expert Syst Appl 39(7):6335–6342CrossRef
39.
go back to reference Karaboga D, Basturk B (2008) On the performance of artificial bee colony (ABC) algorithm. Appl Soft Comput 8(1):687–697CrossRef Karaboga D, Basturk B (2008) On the performance of artificial bee colony (ABC) algorithm. Appl Soft Comput 8(1):687–697CrossRef
40.
go back to reference Tanweer MR, Suresh S, Sundararajan N (2015) Self regulating particle swarm optimization algorithm. Inf Sci 294:182–202MathSciNetCrossRef Tanweer MR, Suresh S, Sundararajan N (2015) Self regulating particle swarm optimization algorithm. Inf Sci 294:182–202MathSciNetCrossRef
41.
go back to reference Fister I, Fister I Jr, Yang XS, Brest J (2013) A comprehensive review of firefly algorithms. Swarm Evolut Comput 13:34–46CrossRef Fister I, Fister I Jr, Yang XS, Brest J (2013) A comprehensive review of firefly algorithms. Swarm Evolut Comput 13:34–46CrossRef
42.
go back to reference Gupta D, Sundaram S, Khanna A, Hassanien AE, de Albuquerque VHC (2018) Improved diagnosis of Parkinson’s disease using optimized crow search algorithm. Comput Electr Eng 68:412–424CrossRef Gupta D, Sundaram S, Khanna A, Hassanien AE, de Albuquerque VHC (2018) Improved diagnosis of Parkinson’s disease using optimized crow search algorithm. Comput Electr Eng 68:412–424CrossRef
43.
go back to reference He S, Wu QH, Saunders JR (2009) Group search optimizer: an optimization algorithm inspired by animal searching behavior. IEEE Trans Evol Comput 13(5):973–990CrossRef He S, Wu QH, Saunders JR (2009) Group search optimizer: an optimization algorithm inspired by animal searching behavior. IEEE Trans Evol Comput 13(5):973–990CrossRef
Metadata
Title
Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector
Authors
M. M. Annie Alphonsa
P. Amudhavalli
Publication date
16-08-2018
Publisher
Springer Berlin Heidelberg
Published in
Evolutionary Intelligence / Issue 1-2/2018
Print ISSN: 1864-5909
Electronic ISSN: 1864-5917
DOI
https://doi.org/10.1007/s12065-018-0162-4

Other articles of this Issue 1-2/2018

Evolutionary Intelligence 1-2/2018 Go to the issue

Premium Partner