Skip to content
2000
Volume 19, Issue 2
  • ISSN: 1872-2121
  • E-ISSN: 2212-4047

Abstract

Background

The Cloud model is one of the most realistic frameworks with a vast range of social networking interactions. In medical data, security is a major constraint as it incorporates information about the patients. The cloud environment subjected to mobility and openness is exposed to security issues and limits authorization levels for data transmission.

Objective

This patent paper aims to propose a security model for attack prevention within the healthcare environment.

Methods

The proposed Cryptographic Attribute-based Machine Learning (CAML) scheme incorporates three stages. Initially, the homomorphic encryption escrow is performed for secure data transmission in the cloud. Secondly, the information of the users is evaluated based on the consideration of users' authorization. The authorization process for the users is carried out with the attribute-based ECC technique. Finally, the ML model with the classifier is applied for the detection and classification of attacks in the medical network.

Results

The detected attack is computed and processed with the CNN model. Simulation analysis is performed for the proposed CAML with conventional ANN, CNN, and RNN models. The simulation analysis of proposed CAML achieves a higher accuracy of 0.96 while conventional SVM, RF, and DT achieve an accuracy of 0.82, 0.89 and 0.93, respectively.

Conclusion

With the analysis, it is concluded that the proposed CAML model achieves higher classification accuracy for attack detection and prevention in the cloud computing environment.

Loading

Article metrics loading...

/content/journals/eng/10.2174/0118722121241098230926064800
2025-02-01
2024-11-22
Loading full text...

Full text loading...

References

  1. DangL.M. PiranM.J. HanD. MinK. MoonH. A survey on internet of things and cloud computing for healthcare.Electronics20198776810.3390/electronics8070768
    [Google Scholar]
  2. AlamT. Cloud computing and its role in the information technology.IAIC Transac. Sustain. Digital Innov. (ITSDI)20201210811510.34306/itsdi.v1i2.103
    [Google Scholar]
  3. GaiK. GuoJ. ZhuL. YuS. Blockchain meets cloud computing: A survey.IEEE Commun. Surv. Tutor.20202232009203010.1109/COMST.2020.2989392
    [Google Scholar]
  4. Mohammed SadeeqM. AbdulkareemN.M. ZeebareeS.R.M. Mikaeel AhmedD. Saifullah SamiA. ZebariR.R. IoT and Cloud computing issues, challenges and opportunities: A review.Qubahan Academic J.2021121710.48161/qaj.v1n2a36
    [Google Scholar]
  5. RajabionL. ShaltookiA.A. TaghikhahM. GhasemiA. BadfarA. Healthcare big data processing mechanisms: The role of cloud computing.Int. J. Inf. Manage.20194927128910.1016/j.ijinfomgt.2019.05.017
    [Google Scholar]
  6. DarwishA. HassanienA.E. ElhosenyM. SangaiahA.K. MuhammadK. The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: Opportunities, challenges, and open problems.J. Ambient Intell. Humaniz. Comput.201910104151416610.1007/s12652‑017‑0659‑1
    [Google Scholar]
  7. EhwerhemuephaL. GasperinoG. BischoffN. TaramanS. ChangA. FeasterW. HealtheDataLab - a cloud computing solution for data science and advanced analytics in healthcare with application to predicting multi-center pediatric readmissions.BMC Med. Inform. Decis. Mak.202020111510.1186/s12911‑020‑01153‑7 31906929
    [Google Scholar]
  8. ShabbirM. ShabbirA. IwendiC. JavedA.R. RizwanM. HerencsarN. LinJ.C.W. Enhancing security of health information using modular encryption standard in mobile cloud computing.IEEE Access202198820883410.1109/ACCESS.2021.3049564
    [Google Scholar]
  9. SivanR. ZukarnainZ.A. Security and privacy in cloud-based E-health system.Symmetry202113574210.3390/sym13050742
    [Google Scholar]
  10. KeshtaI. OdehA. Security and privacy of electronic health records: Concerns and challenges.Egyptian Inform. J.202122217718310.1016/j.eij.2020.07.003
    [Google Scholar]
  11. DeepikaJ. RajanC. SenthilT. Security and privacy of cloud-and IoT-based medical image diagnosis using fuzzy convolutional neural network.Comput. Intell. Neurosci.2021202111710.1155/2021/6615411 33790958
    [Google Scholar]
  12. SharmaD.K. ChakravarthiD.S. ShaikhA.A. AhmedA.A.A. JaiswalS. NavedM. The aspect of vast data management problem in healthcare sector and implementation of cloud computing technique.Mater. Today Proc.202180338053810
    [Google Scholar]
  13. RajkumarN. KannanE. Security enhancement of e-healthcare system in cloud using efficient cryptographic method. Recent Trends in Communication and Intelligent Systems..SingaporeSpringer2021475510.1007/978‑981‑16‑0167‑5_6
    [Google Scholar]
  14. AbdulRaheemM. An enhanced lightweight speck system for cloud-based smart healthcare International Conference on Applied Informatics..SpringerCham2021363376
    [Google Scholar]
  15. ChhaybiA. LazaarS. Definition of a lightweight cryptographic solution to secure health data on IoT and cloud.General Lett. Math.2021102546010.31559/glm2021.10.2.6
    [Google Scholar]
  16. AliA. PashaM.F. AliJ. FangO.H. MasudM. JurcutA.D. AlzainM.A. Deep learning based homomorphic secure search-able encryption for keyword search in blockchain healthcare system: A novel approach to cryptography.Sensors202222252810.3390/s22020528 35062491
    [Google Scholar]
  17. SowjanyaK. DasguptaM. RayS. A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems.J. Systems Archit.202111710210810.1016/j.sysarc.2021.102108
    [Google Scholar]
  18. AndiH.K. Estimating the role of blockchain, deep learning and cryptography algorithms in cloud security.J. Trends Comput. Sci. Smart Technol.20223430531310.36548/jtcsst.2021.4.006
    [Google Scholar]
  19. KumarS. KarnaniG. GaurM.S. MishraA. Cloud security using hybrid cryptography algorithms2nd International Conference on Intelligent Engineering and Management (ICIEM)London, United Kingdom, 28-30 April202159960410.1109/ICIEM51511.2021.9445377
    [Google Scholar]
  20. SundarK. SasikumarS. JayakumarC. Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud.Quantum Inform. Process.202221311510.1007/s11128‑022‑03452‑6
    [Google Scholar]
  21. GuptaK. GuptaD. PrasadS.K. JohriP. A review on cryptography based data security techniques for the cloud computing2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)Greater Noida, India, 04-05 Mar20211039104410.1109/ICACITE51222.2021.9404568
    [Google Scholar]
  22. ThabitF. AlhomdyA.P.S. Al-AhdalA.H.A. JagtapP.D.S. A new lightweight cryptographic algorithm for enhancing data security in cloud computing.Glob. Transit. Proc.202121919910.1016/j.gltp.2021.01.013
    [Google Scholar]
  23. AbelK.D. MisraS. AgrawalA. MaskeliunasR. DamaseviciusR. Data security using cryptography and steganography technique on the cloudComputational Intelligence in Machine Learning: Select Proceedings of ICCIML..SpringerSingapore202247548110.1007/978‑981‑16‑8484‑5_46
    [Google Scholar]
  24. VelmurugadassP. DhanasekaranS. Shasi AnandS. VasudevanV. Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm.Mater. Today Proc.2021372653265910.1016/j.matpr.2020.08.519
    [Google Scholar]
  25. MusaA. MahmoodA. Client-side cryptography based security for cloud computing system2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS)Coimbatore, India, 25-27 Mar202159460010.1109/ICAIS50930.2021.9395890
    [Google Scholar]
  26. SavantV.B. KasarR.D. A review on network security and cryptography.Res. J. Eng. Technol.202112411011410.52711/2321‑581X.2021.00019
    [Google Scholar]
  27. AdeeR. MouratidisH. A dynamic four-step data security model for data in cloud computing based on cryptography and steganography.Sensors2022223110910.3390/s22031109 35161853
    [Google Scholar]
  28. TahirM. SardarazM. MehmoodZ. MuhammadS. CryptoGA: A cryptosystem based on genetic algorithm for cloud data security.Cluster Comput.202124273975210.1007/s10586‑020‑03157‑4
    [Google Scholar]
/content/journals/eng/10.2174/0118722121241098230926064800
Loading
/content/journals/eng/10.2174/0118722121241098230926064800
Loading

Data & Media loading...


  • Article Type:
    Research Article
Keyword(s): attack; classifier; cryptography; healthcare; homomorphic; Security
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test