A SURVEY ON SECURITY TECHNIQUES IN A HEALTHCARE CLOUD FOR PROTECTING THE PRIVACY OF MEDICAL BIG DATA

Authors

  • T S Vinutha PG student, Department Information Science and Engineering, BMSCE
  • Dr.Shambavi B R Associate professor, department of Information Science and Engineering, BMSCE

Keywords:

key management; Fog computing; Medical big data; security and privacy; pairing-based cryptography; decoy technique

Abstract

The healthcare big data is fast growing and plays a major role in providing a healthcare service such as
telemedicine. Telemedicine is a telecommunication technology, where the healthcare professionals diagnose and evaluate to
treat a patient. The healthcare professionals need to access the electronic medical record(EMR) of the patient ,which
contains huge big data such as X-rays, CT scan, MRI reports etc. For efficient access and support the EMR needs to be kept
in big data storage in the cloud. Apart from these there are several security issues in the cloud for example, a data theft
attack is one of the security breaches of healthcare data in the cloud. In this paper, we focus mainly to secure the private
data in the cloud using fog computing. We have also proposed a protocol called tri-party one round authenticated key
agreement, which is based on bilinear pairing cryptography. This generates a key which provides a secure communication
among the participants. Thus the private data in cloud is stored and accessed securely by implementing a decoy technique.

Published

2018-03-25

How to Cite

A SURVEY ON SECURITY TECHNIQUES IN A HEALTHCARE CLOUD FOR PROTECTING THE PRIVACY OF MEDICAL BIG DATA. (2018). International Journal of Advance Engineering and Research Development (IJAERD), 5(3), 1368-1372. https://ijaerd.org/index.php/IJAERD/article/view/2931

Similar Articles

1-10 of 3762

You may also start an advanced similarity search for this article.