An Efficient Water Marking and Intrusion Detection System Framework for Insider Attack Detection in Cloud Based E-Healthcare Data Management

Authors

  • S. Palani Assistant Professor, Sri krishna college of Engineering, Coimbatore
  • K. Rameshbabu Professor, Vellore Institute of Technology, vellore

Keywords:

Cloud Computing, Resource allocation, Task Scheduling, Improved Cuckoo Search Algorithm (ICSA), Deep Reinforcement Learning (DRL), Watermarking Techniques, Intrusion Detection System (IDS), E-Health Care Services

Abstract

The health care industries in recent years have been facing numerous challenges towards the implementation of electronic health records in preserving the privacy of patients and keeping intact their information. The impact of e-Healthcare system has resulted in inappropriate investigation of patient’s health records. This in turn has affected the cost effectiveness and data consumption. Therefore, the liability towards these two factors is greatly affected. Hence, lack of an appropriate system for detection brings about data breaches. The concept of enabling eHealth systems on the cloud environment will provide a practical solution to the existing problem failing which health records are prone to attacks and intrusion. Any such attacks consequently incur misrepresentation of data which may prove to be endangering for the patients. While the recent researches have failed to throw light on identifying a malignant insider, the current research proposes a novel method which is inbuilt of options for identifying a destructive insider.The effective resource allocation module and watermarking methods used in conjunction with Intrusion Detection System (IDS) for Cloud-based Healthcare System are the main topics of this article. Regarding data storage and malware attack detection, the suggested solution is thought to be more effective and functional. This work uses the Improved Cuckoo Search Algorithm (ICSA) and Convolutional Neural Network for task scheduling and resource allocation (CNN). The spatial domain is reliant on the watermark's hindrance on the pictures' least significant bits (LSB) when a later watermarking approach is utilised. Finally, an intrusion assault detection framework is used for identification in order to determine the attackers of information notification in the e-Health care system. In order to defend against data modification attacks and to identify intruders, watermarking is crucial. Thus, this investigational assessment shows the proposed research which delivers efficient storage of health data in a highly secured environment.

Downloads

Download data is not yet available.

References

D. Ergu, G. Kou, Y. Peng, Y. Shi, Y. Shi, The analytic hierarchy process: task scheduling and resource allocation in cloud computing environment, The Journal of Supercomputing, 64(3): 835-848, 2013, doi: 10.1007/s11227-011-0625-1.

P. S. Pillai, S. Rao, Resource allocation in cloud computing using the uncertainty principle of game theory, IEEE Systems Journal, 10(2): 637-648, 2014, doi: 10.1109/JSYST.2014.2314861.

S. Vakilinia, B. Heidarpour, M. Cheriet, Energy efficient resource allocation in cloud computing environments, IEEE Access, 4 (12): 8544-8557, 2016, doi: 10.1109/ACCESS.2016.2633558.

P. Mishra, E. S. Pilli, V. Varadharajan, U. Tupakula, (2017). Intrusion detection techniques in cloud environment: A survey, Journal of Network and Computer Applications, 77(1): 18-47, 2017, doi: https://doi.org/10.1016/j.jnca.2016.10.015.

D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Generation computer systems, 28(3): 583-592, 2012, doi: https://doi.org/10.1016/j.future.2010.12.006.

K. Popović, Ž. Hocenski, Cloud computing security issues and challenges, In The 33rd International Convention Mipro, Opatija, Croatia, pp. 344-349, 2010, doi: https://ieeexplore.ieee.org/abstract/document/553331.

M. Almorsy, J. Grundy, I. Müller, An analysis of the cloud computing security problem, Published in in Proceedings of the APSEC 2010 Cloud Workshop, Sydney, Australia, pp. 1-6, 2016, doi: https://doi.org/10.48550/arXiv.1609.01107.

C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, M. Rajarajan, A survey of intrusion detection techniques in cloud, Journal of Network and Computer Applications, 36(1): 42-57, 2013, doi: https://doi.org/10.1016/j.jnca.2012.05.003.

R. Arora, A. Parashar, CCI transforming, Secure user data in cloud computing using encryption algorithms, International Journal of Engineering Research and Applications, 3(4): 1922-1926, 2013, doi: 10.4236/jis.2015.61002.

D. Y. Chang, M. Benantar, J. Y. C. Chang, V. Venkataramappa, U.S. Patent No. 8,769,622. Washington, DC: U.S. Patent and Trademark Office, 2014.

M. Almorsy, J. Grundy, A. S. Ibrahim, Collaboration-based cloud computing security management framework, In 2011 IEEE 4th International Conference on Cloud Computing, Washington, DC, USA, pp. 364-371, 2011, doi: 10.1109/CLOUD.2011.9.

T. Gunasekhar, K. T. Rao, V. K. Reddy, B. T. Rao, Mitigation of insider attacks through multi-cloud, International Journal of Electrical & Computer Engineering, 5(1): 136-141, 2015, doi: https://core.ac.uk/reader/334419680.

Z. M. Yusop, J. Abawajy, Analysis of insiders attack mitigation strategies, Procedia-Social and Behavioral Sciences, 129(5): 581-591, 2014, doi: https://doi.org/10.1016/j.sbspro.2014.03.716.

A. Duncan, S. Creese, M. Goldsmith, A combined attack-tree and kill-chain approach to designing attack-detection strategies for malicious insiders in cloud computing, In 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Oxford, UK, pp. 1-9, 2019, doi: 10.1109/CyberSecPODS.2019.8885401.

N. C. S. Iyengar, A. Banerjee, G. Ganapathy, A fuzzy logic based defense mechanism against distributed denial of service attack in cloud computing environment, International Journal of Communication Networks and Information Security, 6(3), 233, 2014, doi: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=01be7ab80b1ab81d9ba07d5e1ab96ac95bd885de.

C. C. Lo, C. C. Huang, J. Ku, A cooperative intrusion detection system framework for cloud computing networks, In 2010 39th International Conference on Parallel Processing Workshops, San Diego, CA, USA, pp. 280-284, 2010, doi: 10.1109/ICPPW.2010.46.

A. V. Dastjerdi, K. A. Bakar, S. G. H. Tabatabaei, Distributed intrusion detection in clouds using mobile agents, In 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences, Sliema, Malta, pp. 175-180, 2009, doi: 10.1109/ADVCOMP.2009.34.

Z. Chiba, N. Abghour, K. Moussaid, M. Rida, A cooperative and hybrid network intrusion detection framework in cloud computing based on snort and optimized back propagation neural network, Procedia Computer Science, 83(1): 1200-1206, 2016, doi: https://doi.org/10.1016/j.procs.2016.04.249.

S. Roschke, F. Cheng, C. Meinel, An extensible and virtualization-compatible IDS management architecture, In 2009 Fifth International Conference on Information Assurance and Security, Xi'an, China, pp. 130-134, 2009, doi: 10.1109/IAS.2009.151.

C. N. Modi, D. Patel, A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing, In 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), Singapore, pp. 23-30, 2013, doi: 10.1109/CICYBS.2013.6597201.

U. Oktay, O. K. Sahingoz, Proxy network intrusion detection system for cloud computing, In 2013 The International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Konya, Turkey, pp. 98-104, 2013, doi: 10.1109/TAEECE.2013.6557203.

A. Patel, Q. Qassim, Z. Shukor, J. Nogueira, J. Júnior, C. Wills, P. Federal, Autonomic agent-based self-managed intrusion detection and prevention system, In Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, pp. 223-234, 2011.

F. M. Okikiola, A. M. Mustapha, A. F. Akinsola, M. A. Sokunbi, A new framework for detecting insider attacks in cloud-based e-health care system, International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS), Ayobo, Nigeria, pp. 1-6, 2020, doi: 10.1109/ICMCECS47690.2020.240889.

C. Chakraborty, A. Kishor, Real-time cloud-based patient-centric monitoring using computational health systems, IEEE Transactions on Computational Social Systems, 9(6): 1613-1623, 2022, doi: 10.1109/TCSS.2022.3170375.

A. Kishor, C. Chakarbarty, Task offloading in fog computing for using smart ant colony optimization, Wireless Personal Communications, pp. 1-22, 2021, doi: https://link.springer.com/article/10.1007/s11277-021-08714-7.

A. Kishor, C. Chakraborty, W. Jeberson, Reinforcement learning for medical information processing over heterogeneous networks, Multimedia Tools and Applications, 80(16): 23983-24004, , doi: https://link.springer.com/article/10.1007/s11042-021-10840-0.

A. H. Gandomi, X. S. Yang, A. H. Alavi, Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems, Engineering with Computers, 29(1): 17-35, 2013, doi: https://link.springer.com/article/10.1007/s00366-011-0241-y.

M. P. K. Shelke, M. S. Sontakke, A. D. Gawande, Intrusion detection system for cloud computing, International Journal of Scientific & Technology Research, 1(4): 67-71, 2012, doi: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=d60f1d825f98e342cc90f5cc0498f9d544706e19.

B. Brik, N. Lagraa, H. Cherroun, A. Lakas, Token-based clustered data gathering protocol (TCDGP) in vehicular networks, In 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, Italy, pp. 1070-1074, 2013, doi: 10.1109/IWCMC.2013.6583705.

B. Brik, N. Lagraa, M. B. Yagoubi, A. Lakas, An efficient and robust clustered data gathering protocol (CDGP) for vehicular networks, In Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications, New York, NY, USA, pp. 69-74, 69–74, 2012, doi: https://doi.org/10.1145/2386958.2386969.

Hemanand, D., Reddy, G. ., Babu, S. S. ., Balmuri, K. R. ., Chitra, T., & Gopalakrishnan, S. (2022). An Intelligent Intrusion Detection and Classification System using CSGO-LSVM Model for Wireless Sensor Networks (WSNs). International Journal of Intelligent Systems and Applications in Engineering, 10(3), 285–293. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2167

S. Gopalakrishnan and P. M. Kumar, "An Improved velocity Energy-efficient and Link-aware Cluster-Tree based data collection scheme for mobile networks," 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2016, pp. 1-10, doi: 10.1109/ICACCS.2016.7586372.

Russo, L., Kamińska, K., Christensen, M., Martínez, L., & Costa, A. Machine Learning for Real-Time Decision Support in Engineering Operations. Kuwait Journal of Machine Learning, 1(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/117

Ricci, A., Jankowski, M., Pedersen, A., Sánchez, F., & Oliveira, F. Predicting Engineering Student Success using Machine Learning Algorithms. Kuwait Journal of Machine Learning, 1(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/118

Rossi, G., Nowak, K., Nielsen, M., García, A., & Silva, J. Enhancing Collaborative Learning in Engineering Education with Machine Learning. Kuwait Journal of Machine Learning, 1(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/119

Agrawal, S. A., Umbarkar, A. M., Sherie, N. P., Dharme, A. M., & Dhabliya, D. (2021).Statistical study of mechanical properties for corn fiber with reinforced of polypropylene fiber matrix composite. Materials Today: Proceedings, doi:10.1016/j.matpr.2020.12.1072

Downloads

Published

11.07.2023

How to Cite

Palani , S. ., & Rameshbabu, K. . (2023). An Efficient Water Marking and Intrusion Detection System Framework for Insider Attack Detection in Cloud Based E-Healthcare Data Management. International Journal of Intelligent Systems and Applications in Engineering, 11(9s), 429–443. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3133

Issue

Section

Research Article