A SECURE ELECTRONIC HEALTH FRAMEWORK TO PROTECT HEALTH RECORDS USING NATURAL LANGUAGE PROCESSING WITH MULTI LEVEL DATA ENCRYPTION IN CLOUD

Authors

  • N. Subhalakshmi, M.V. Srinath

Keywords:

big data, cloud computing, encryption, Natural Language Processing (NLP), patients' history

Abstract

Big data is a set of a massive quantity of large datasets with data volume. With the growing number of data, the demand for big data storage will increase. By setting the records inside the cloud, that data is to be available to anybody from anywhere. Cloud computing is an evolving, carrier-centric framework for performing distributed and parallel computing on large datasets. As the benefits of cloud computing increase in terms of cost, storage space, and scalability, all data providers and institutions are also focusing on offloading data from local servers to remote cloud servers. Medical records are essential and most important because the government retains additional data on the medical history of the data and medical professionals can provide the most appropriate and effective remedies or support for their concerns. It is also useful for diagnosing viable illnesses, identifying family hereditary and possible illnesses, allergic reactions, past and present dosing, and vaccination statistics. The proposed work aims to develop a three-tier framework to protect the privacy of records stored in big data environment and analyses the document about the protected text and breaks the protected content into separate documents. This research work categorizes, distributes, and stores health-related content using a combination of Natural Language Processing (NLP) and text mining algorithms. After associating the distributed content with the original parent document, it encrypts the attribution information of the patient's history and saves in the clouds for future

Downloads

Download data is not yet available.

References

J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun and Y. Xiang, "Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing", in IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 6, pp. 996-1010, 1 Nov.-Dec. 2019, doi: 10.1109/TDSC.2017.2725953.

N. M. Ibrahim and A. Zainal, "A Model for Adaptive and Distributed Intrusion Detection for Cloud Computing", Seventh ICT International Student Project Conference (ICT-ISPC), 2018, pp. 1-6, doi: 10.1109/ICT-ISPC.2018.8523905.

F. Fowley, C. Pahl, P. Jamshidi, D. Fang and X. Liu, "A Classification and Comparison Framework for Cloud Service Brokerage Architectures", in IEEE Transactions on Cloud Computing, vol. 6, no. 2, pp. 358-371, 1 April-June 2018, doi: 10.1109/TCC.2016.2537333.

Z. Chunlei, J. Yin and X. Qianli, "The Workload Assessment of National Grid Big Data Projects Based on Content Recommendations and Text Classification", IEEE 5th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA), 2020, pp. 482-490, doi: 10.1109/ICCCBDA49378.2020.9095612.

MuhnedHussam, Ghassan H. Abdul-majeed, Haider K. Hooomod, “New Lightweight Hybrid Encryption Algorithm for Cloud Computing (LMGHA-128bit) by using new 5-D hyperchaos system”, Turkish Journal of Computer and Mathematics Education Vol.12 No.10, 2021, 2531-2540.

Mohammed Nazeh Abdul Wahid, Abdulrahman Ali, BabakEsparham and Mohamed Marwan, “A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention”, Journal of Computer Science Applications and Information Technology, ISSN Online: 2474-9257, 2018.

C.G. Thorat, V.S. Inamdar, “Implementation of new hybrid lightweight cryptosystem”, Applied Computing and Informatic, 2018, 2210-8327 doi: https://doi.org/10.1016/j.aci.2018.05.001.

Zaid M. Jawad Kubba1 and Haider K. Hoomod, “Modified PRESENT Encryption algorithm based on new 5D Chaotic system”, IOP Conference Series: Materials Science and Engineering 928 (2020) 032023 IOP Publishing doi:10.1088/1757-899X/928/3/032023.

F. Pallas, D. Staufer and J. Kuhlenkamp, "Evaluating the Accuracy of Cloud NLP Services Using Ground-Truth Experiments", IEEE International Conference on Big Data (Big Data), 2020, pp. 341-350, doi: 10.1109/BigData50022.2020.9378188.

AliGholami and Erwin Laure, “Big Data Security and Privacy Issues in the Cloud”, International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.1, January 2016.

Soleimany, H., “Self-similarity cryptanalysis of the block cipher”, Institute of Engineering and Technology Information Security research article, 2015, Vol. 9, Issue 3, pp.179-184.

R. Kumar and M. P. S. Bhatia, "A Systematic Review of the Security in Cloud Computing: Data Integrity, Confidentiality and Availability", IEEE International Conference on Computing, Power and Communication Technologies (GUCON), 2020, pp. 334-337, doi: 10.1109/GUCON48875.2020.9231255.

N. A. Patel, "A Survey on Security Techniques used for Confidentiality in Cloud Computing", International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET), 2018, pp. 1-6, doi: 10.1109/ICCSDET.2018.8821135.

S. A. Oli and L. Arockiam, "Confidentiality Technique to Encrypt and Obfuscate Non-Numerical and Numerical Data to Enhance Security in Public Cloud Storage", World Congress on Computing and Communication Technologies (WCCCT), 2017, pp. 176-180, doi: 10.1109/WCCCT.2016.51.

A. Mondal, S. Paul, R. T. Goswami and S. Nath, "Cloud computing security issues & challenges: A Review", International Conference on Computer Communication and Informatics (ICCCI), 2020, pp. 1-5, doi: 10.1109/ICCCI48352.2020.9104155.

M. Elsayed and M. Zulkernine, "Towards Security Monitoring for Cloud Analytic Applications", IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), 2018, pp. 69-78, doi: 10.1109/BDS/HPSC/IDS18.2018.00028.

Eslam w. afify, Abeer T. Khalil, Wageda I. El sobky, RedaAboAlez, “Performance Analysis of Advanced Encryption Standard (AES) S-boxes”, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-9, Issue-1, May 2020, DOI:10.35940/ijrte.F9712.059120

SyihamMohdLokman, ChuahChaiWen, NurulHidayahBinti Ab. Rahman, IsredzaRahmiBinti A. Hamid, “A Study of Caesar Cipher and Transposition Cipher InJawi Messages”, Journal of Computational and Theoretical Nanoscience, March 2018 DOI: 10.1166/asl.2018.11130

Priti V. Bhagat, Kaustubh S. Satpute, Vikas R. Palekar, “Reverse Encryption Algorithm: A Technique for Encryption & Decryption”, International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 2 Issue 1 January 2013, ISSN: 2278-621X

X. Wu, X. Xu, F. Dai, J. Gao, G. Ji and L. Qi, "An Ensemble of Random Decision Trees with Personalized Privacy Preservation in Edge-Cloud Computing", 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), 2020, pp. 779-786, doi: 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00134.

Yasir Nawaz and Lei Wang, “Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation”, December 2019, Journal of Symmetry 2019, 11, 1485; doi:10.3390/sym11121485

V. K. Soman and V. Natarajan, "An enhanced hybrid data security algorithm for cloud", 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), 2017, pp. 416-419, doi: 10.1109/NETACT.2017.8076807.

Downloads

Published

24.03.2024

How to Cite

N. Subhalakshmi. (2024). A SECURE ELECTRONIC HEALTH FRAMEWORK TO PROTECT HEALTH RECORDS USING NATURAL LANGUAGE PROCESSING WITH MULTI LEVEL DATA ENCRYPTION IN CLOUD. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 3744–3754. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6051

Issue

Section

Research Article