A Novel Ide Based Privacy Preserving Method For Big Data Using Paritial Least Square Regression and ε-Differential Privacy Algorithms
DOI:
https://doi.org/10.26438/ijcse/v6i11.131140Keywords:
Privacy preservation, Sensitive attributes, Non-sensitive attributes, ε-differential privacy preservation, encryption, Identity based encryptionAbstract
Privacy preservation in big data is a need of the time because of the specialties of the data. Many researches have been made to tackle the issues of privacy in big data still some conflicts arises. Hence, an efficient method for the privacy preservation of data should be introduced. In this proposed work, a novel framework is designed for conserving the data in a secure manner. The personal and medical datasets are taken and are being merged which is under the control of hospital admin. This dataset is preprocessed to remove the noise following the normalization technique in order to convert the string into integers. Then, the efficient partial least square regression model is applied for the extraction of features such as sensitive and non-sensitive attributes. After the identification of this sensitive and non-sensitive attributes, ε-differential privacy preservation algorithm, the sensitive data are encrypted with the use of novel identity based encryption technique by generating the key. By the use of this code the user can decrypt the data which is anonymous format. The performance analysis is made on comparing the existing techniques which shows that the proposed methodology provides a better efficiency in terms of encryption cost, key generation cost, overall execution cost, security scheme, and computation complexity
References
[1] S. Ananthi and A. Periwal, "Data Security Based On Big Data Storage," Global Journal of Pure and Applied Mathematics, vol. 12, pp. 1491-1500, 2016.
[2] K. He, et al., "On the security of two identity-based conditional proxy re-encryption schemes," Theoretical Computer Science, vol. 652, pp. 18-27, 2016.
[3] S. Wang, et al., "Attribute-based data sharing scheme revisited in cloud computing," IEEE transactions on information forensics and security, vol. 11, pp. 1661-1673, 2016.
[4] A. Azaria, et al., "Medrec: Using blockchain for medical data access and permission management," in Open and Big Data (OBD), International Conference on, 2016, pp. 25-30.
[5] J. Luo, et al., "Big data application in biomedical research and health care: a literature review," Biomedical informatics insights, vol. 8, p. BII. S31559, 2016.
[6] I. A. T. Hashem, et al., "The rise of “big data” on cloud computing: Review and open research issues," Information Systems, vol. 47, pp. 98-115, 2015.
[7] R. Kune, et al., "The anatomy of big data computing," Software: Practice and Experience, vol. 46, pp. 79-105, 2016.
[8] X. Wu, et al., "Data mining with big data," IEEE transactions on knowledge and data engineering, vol. 26, pp. 97-107, 2014.
[9] S. Sicari, et al., "Security, privacy and trust in Internet of Things: The road ahead," Computer networks, vol. 76, pp. 146-164, 2015.
[10] M. S. Hossain and G. Muhammad, "Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring," Computer Networks, vol. 101, pp. 192-202, 2016.
[11] A. Mehmood, et al., "Protection of big data privacy," IEEE access, vol. 4, pp. 1821-1834, 2016.
[12] S. Yu, "Big privacy: Challenges and opportunities of privacy study in the age of big data," IEEE access, vol. 4, pp. 2751-2763, 2016.
[13] D. Baker, et al., "Privacy-Preserving Linkage of Genomic and Clinical Data Sets," IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2018.
[14] G. Manogaran, et al., "A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system," Future Generation Computer Systems, vol. 82, pp. 375-387, 2018.
[15] A. Lounis, et al., "Healing on the cloud: Secure cloud architecture for medical wireless sensor networks," Future Generation Computer Systems, vol. 55, pp. 266-277, 2016.
[16] C. Guo, et al., "Fine-grained database field search using attribute-based encryption for e-healthcare clouds," Journal of medical systems, vol. 40, p. 235, 2016.
[17] H. K. Patil and R. Seshadri, "Big data security and privacy issues in healthcare," in Big Data (BigData Congress), 2014 IEEE International Congress on, 2014, pp. 762-765.
[18] A. N. Kho, et al., "Design and implementation of a privacy preserving electronic health record linkage tool in Chicago," Journal of the American Medical Informatics Association, vol. 22, pp. 1072-1080, 2015.
[19] D. Vatsalan, et al., "Privacy-preserving record linkage for big data: Current approaches and research challenges," in Handbook of Big Data Technologies, ed: Springer, 2017, pp. 851-895.
[20] K. Liang, et al., "Privacy-preserving ciphertext multi-sharing control for big data storage," IEEE transactions on information forensics and security, vol. 10, pp. 1578-1589, 2015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
