Skip to main content
Erschienen in: International Journal of Parallel Programming 3/2020

16.08.2018

Triple DES: Privacy Preserving in Big Data Healthcare

verfasst von: R. Ramya Devi, V. Vijaya Chamundeeswari

Erschienen in: International Journal of Parallel Programming | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Big data stand as a technique to retrieve, collect, manage and also analyze a vast quantity of structured and also unstructured data which are tough to process utilizing the traditional database that involves new technologies to examine them. With the expanding success of the big data usage, loads of challenges emerged. Timeless, scalability and privacy are the chief problems that researchers endeavor to work out. Privacy-preserving is at present a highly active domain of research. To guarantee a safe and trustworthy big data atmosphere, it is imperative to pinpoint the drawbacks of the existing solutions furthermore conceive directions for future study. In the given paper, the security and also the privacy-preserving on big data is proposed concerning the healthcare industry and to beat security issues in existing approach. Mainly anonymizations along with Triple DES techniques aimed at security purpose are incorporated. Triple DES offers a fairly simple technique of increasing the key size of DES to shield against such attacks, devoid of necessitates to design an entirely new block cipher algorithm. Data anonymization work as an information sanitizer whose target is to defend the data privacy. It encrypts or takes away the personally recognizable data as of the data sets in order that the persons about whom the data designate remain anonymous. In this work, a combination of anonymization and Triple DES are utilized that are shortly called as the A3DES algorithm. Experimental outcome reveals that the approach performed well when contrasted with all other related approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gulia, N., Singh, S., Sapra, L.: A study on different classification models for knowledge discovery. Int. J. Comput. Sci. Mob. Comput. 4(6), 241–248 (2015) Gulia, N., Singh, S., Sapra, L.: A study on different classification models for knowledge discovery. Int. J. Comput. Sci. Mob. Comput. 4(6), 241–248 (2015)
2.
Zurück zum Zitat Ngai, E.W.T., Xiu, L., Chau, D.C.K.: Application of data mining techniques in customer relationship management: a literature review and classification. Expert Syst. Appl. 36(2), 2592–2602 (2009)CrossRef Ngai, E.W.T., Xiu, L., Chau, D.C.K.: Application of data mining techniques in customer relationship management: a literature review and classification. Expert Syst. Appl. 36(2), 2592–2602 (2009)CrossRef
3.
Zurück zum Zitat Nivetha, P.R., Thamaraiselvi, K.: A survey on privacy preserving data mining techniques. Int. J. Comput. Sci. Mob. Comput. 2(10), 166–170 (2013) Nivetha, P.R., Thamaraiselvi, K.: A survey on privacy preserving data mining techniques. Int. J. Comput. Sci. Mob. Comput. 2(10), 166–170 (2013)
4.
Zurück zum Zitat Reddy, P.S., Ravi, C.: A novel technique for privacy preserving data publishing. Int. J. Comput. Sci. Mob. Comput. 3(11), 156–163 (2014) Reddy, P.S., Ravi, C.: A novel technique for privacy preserving data publishing. Int. J. Comput. Sci. Mob. Comput. 3(11), 156–163 (2014)
5.
Zurück zum Zitat Samuel, S., Chen, S., Burr, D.L., Zhang, L.: A new data collection technique for preserving privacy. J. Priv. Confid. 7(3), 99–129 (2017) Samuel, S., Chen, S., Burr, D.L., Zhang, L.: A new data collection technique for preserving privacy. J. Priv. Confid. 7(3), 99–129 (2017)
6.
Zurück zum Zitat Punitha, N., Amsaveni, R.: Methods and techniques to protect the privacy information in privacy preservation data mining. Int. J. Comput. Technol. Appl. IJCTA 2(6), 2091–2097 (2011) Punitha, N., Amsaveni, R.: Methods and techniques to protect the privacy information in privacy preservation data mining. Int. J. Comput. Technol. Appl. IJCTA 2(6), 2091–2097 (2011)
7.
Zurück zum Zitat Mohana Chelvan, P., Perumal, K.: On privacy preserving data mining and feature selection stability measures: a comparative analysis. Int. J. Comput. Eng. Technol. IJCET 9(2), 1–15 (2018) Mohana Chelvan, P., Perumal, K.: On privacy preserving data mining and feature selection stability measures: a comparative analysis. Int. J. Comput. Eng. Technol. IJCET 9(2), 1–15 (2018)
8.
Zurück zum Zitat El Ouazzani, Z., El Bakkali, H.: A new technique ensuring privacy in big data: K-anonymity without prior value of the threshold k. Procedia Comput. Sci. 127, 52–59 (2018)CrossRef El Ouazzani, Z., El Bakkali, H.: A new technique ensuring privacy in big data: K-anonymity without prior value of the threshold k. Procedia Comput. Sci. 127, 52–59 (2018)CrossRef
9.
Zurück zum Zitat Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., Saadi, M.: Big data security and privacy in healthcare: a review. Procedia Comput. Sci. 113, 73–80 (2017)CrossRef Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., Saadi, M.: Big data security and privacy in healthcare: a review. Procedia Comput. Sci. 113, 73–80 (2017)CrossRef
10.
Zurück zum Zitat Qi, X., Zong, M.: An overview of privacy preserving data mining. Procedia Environ. Sci. 12, 1341–1347 (2012)CrossRef Qi, X., Zong, M.: An overview of privacy preserving data mining. Procedia Environ. Sci. 12, 1341–1347 (2012)CrossRef
11.
Zurück zum Zitat Ganesh, D., Mahendran, S.K.: Privacy preservation for data mining security issues. In: International Journal of Computer Applications (0975–8887). International Conference on Current Trends in Advanced Computing (ICCTAC-2015), pp 33–39 (2015) Ganesh, D., Mahendran, S.K.: Privacy preservation for data mining security issues. In: International Journal of Computer Applications (0975–8887). International Conference on Current Trends in Advanced Computing (ICCTAC-2015), pp 33–39 (2015)
12.
Zurück zum Zitat Vennila, S., Priyadarshini, J.: Scalable privacy preservation in big data a survey. Procedia Comput. Sci. 50, 369–373 (2015)CrossRef Vennila, S., Priyadarshini, J.: Scalable privacy preservation in big data a survey. Procedia Comput. Sci. 50, 369–373 (2015)CrossRef
13.
Zurück zum Zitat Singh, M., Halgamuge, M.N., Ekici, G., Jayasekara, C.S.: A review on security and privacy challenges of big data. In: Sangaiah, A., Thangavelu, A., Meenakshi Sundaram, V. (eds.) Cognitive Computing for Big Data Systems Over IoT. Lecture Notes on Data Engineering and Communications Technologies, vol. 14. Springer, Cham (2018) Singh, M., Halgamuge, M.N., Ekici, G., Jayasekara, C.S.: A review on security and privacy challenges of big data. In: Sangaiah, A., Thangavelu, A., Meenakshi Sundaram, V. (eds.) Cognitive Computing for Big Data Systems Over IoT. Lecture Notes on Data Engineering and Communications Technologies, vol. 14. Springer, Cham (2018)
14.
Zurück zum Zitat Li, S., Gao, J.: Security and privacy for big data. In: Yu, S., Guo, S. (eds.) Big Data Concepts, Theories, and Applications, pp. 281–313. Springer, Cham (2016)CrossRef Li, S., Gao, J.: Security and privacy for big data. In: Yu, S., Guo, S. (eds.) Big Data Concepts, Theories, and Applications, pp. 281–313. Springer, Cham (2016)CrossRef
15.
Zurück zum Zitat Divecha, H., Mehta, S.: Privacy preserving based on geometric transformation using data perturbation technique. Int. J. Softw. Hardw. Res. Eng. 2(5), 6–13 (2014) Divecha, H., Mehta, S.: Privacy preserving based on geometric transformation using data perturbation technique. Int. J. Softw. Hardw. Res. Eng. 2(5), 6–13 (2014)
16.
Zurück zum Zitat Aldeen, Y.A.A.S., Salleh, M., Razzaque, M.A.: A comprehensive review on privacy preserving data mining. SpringerPlus 4(1), 694 (2015)CrossRef Aldeen, Y.A.A.S., Salleh, M., Razzaque, M.A.: A comprehensive review on privacy preserving data mining. SpringerPlus 4(1), 694 (2015)CrossRef
17.
Zurück zum Zitat Shorfuzzaman, M.: Leveraging cloud based big data analytics in knowledge management for enhanced decision making in organizations. Int. J. Distrib. Parallel Syst. 8(1), 1–13 (2017)CrossRef Shorfuzzaman, M.: Leveraging cloud based big data analytics in knowledge management for enhanced decision making in organizations. Int. J. Distrib. Parallel Syst. 8(1), 1–13 (2017)CrossRef
18.
Zurück zum Zitat Abouelmehdi, K., Beni-Hessane, A., Khaloufi, H.: Big healthcare data: preserving security and privacy. J. Big Data 5(1), 1 (2018)CrossRef Abouelmehdi, K., Beni-Hessane, A., Khaloufi, H.: Big healthcare data: preserving security and privacy. J. Big Data 5(1), 1 (2018)CrossRef
20.
Zurück zum Zitat Kaur, H., Kumar, N., Batra, S.: An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. Future Gener. Comput. Syst. 86, 297–307 (2018)CrossRef Kaur, H., Kumar, N., Batra, S.: An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. Future Gener. Comput. Syst. 86, 297–307 (2018)CrossRef
22.
Zurück zum Zitat Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5, 3302–3312 (2017)CrossRef Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5, 3302–3312 (2017)CrossRef
23.
Zurück zum Zitat Ara, A., Al-Rodhaan, M., Tian, Y., Al-Dhelaan, A.: A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems. IEEE Access 5, 12601–12617 (2017)CrossRef Ara, A., Al-Rodhaan, M., Tian, Y., Al-Dhelaan, A.: A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems. IEEE Access 5, 12601–12617 (2017)CrossRef
24.
Zurück zum Zitat Rahman, F., Bhuiyan, M.Z.A., Ahamed, S.I.: A privacy preserving framework for RFID based healthcare systems. Future Gener. Comput. Syst. 72, 339–352 (2017)CrossRef Rahman, F., Bhuiyan, M.Z.A., Ahamed, S.I.: A privacy preserving framework for RFID based healthcare systems. Future Gener. Comput. Syst. 72, 339–352 (2017)CrossRef
Metadaten
Titel
Triple DES: Privacy Preserving in Big Data Healthcare
verfasst von
R. Ramya Devi
V. Vijaya Chamundeeswari
Publikationsdatum
16.08.2018
Verlag
Springer US
Erschienen in
International Journal of Parallel Programming / Ausgabe 3/2020
Print ISSN: 0885-7458
Elektronische ISSN: 1573-7640
DOI
https://doi.org/10.1007/s10766-018-0592-8

Weitere Artikel der Ausgabe 3/2020

International Journal of Parallel Programming 3/2020 Zur Ausgabe

Premium Partner