A NOVEL SECURE OUTSOURCING METHOD FOR MEDICAL DATA

Main Article Content

Dr. P. Vijay Paul REDDY
Dr V. Ramesh
Dr. B.V BABU
Donthireddy Vijaya LAKSHMI

Abstract

Medical imaging is essential for diagnosing illnesses, and due to the delicate nature of medical images, stringent security and privacy measures must be in place. Medical images should be secured before being outsourced in a cloud-based medical system for Healthcare Industry 4.0. However, it is difficult and currently impractical to process queries over encrypted data without first performing the decryption step. In the paper, we suggest an effective method for locating the precise nearest neighbour in a set of encrypted medical photos. By obtaining the lower bound of the Euclidean distance, which is correlated with the mean and standard deviation of the data, we can eliminate candidates instead of computing the Euclidean distance. Our method can find the precise nearest neighbour as opposed to an approximation, unlike the majority of other existing approaches. We then assess our suggested strategy to show its usefulness.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
REDDY, D. P. V. P. ., Ramesh, D. V., BABU, D. B., & LAKSHMI, D. V. (2019). A NOVEL SECURE OUTSOURCING METHOD FOR MEDICAL DATA. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 10(3), 1589–1593. https://doi.org/10.61841/turcomat.v10i3.14560
Section
Articles

References

J. Li, L. Huang, Y. Zhou, S. He, Z. Ming, “Computation partitioning for mobile cloud computing in big data

environment,” IEEE Trans. Ind. Informat., vol. 13, no. 4, pp. 2009-2018, Feb. 2017.

K.-K. R. Choo, “Cloud computing: Challenges and future directions,” Trends & Issues in Crime and Criminal

Justice, vol. 400, no. 400, pp. 1– 6, Oct. 2010.

M. Pajic, R. Mangharam, O. Sokolsky, D. Arney, J. M. Goldman, and I. Lee, “Model-driven safety analysis

of closed-loop medical systems,” IEEE Trans. Ind. Informat., vol. 10, no. 1, pp. 3–16, Feb. 2014.

B. Xu, L. D. Xu, H. Cai, C. Xie, J. Hu, and F. Bu, “Ubiquitous data accessing method in IoT-based information

system for emergency medical services,” IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1578– 1586, May. 2014.

G. Yang et al., “A health-IoT platform based on the integration of intelligent packaging, unobtrusive biosensor, and intelligent medicine box,” IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2180–2191, Nov. 2014.

H. Huang, T. Gong, N. Ye, R. Wang, and Y. Dou, “Private and Secured Medical Data Transmission and

Analysis for Wireless Sensing Healthcare System,” IEEE Trans. Ind. Informat., vol. 13, no.3 pp. 1227-1237, June.

M. Li, S. Yu, W. Lou, and Y. T. Hou, “Toward privacy-assured cloud data services with flexible search

functionalities,” in Proc. ICDCSW. IEEE, Macau, CHN, 2012, pp. 466–470.

P. Williams, R. Sion, and B. Carbunar, “Building castles out of mud: practical access pattern privacy and

correctness on untrusted storage,” in Proc. CCS. ACM, Alexandria, VA, USA, 2008, pp. 139–148.

M. S. Islam, M. Kuzu, and M. Kantarcioglu, “Access pattern disclosure on searchable encryption:

Ramification, attack and mitigation,” in NDSS, San Diego, CA, USA, 2012.

D. E. Knuth, “Sorting and searching,” in The art of computer programming, vol. 3, Boston, USA: AddisonWesley, 1973.

D. Song, D. Wagner, and A. Perrig, “Practical Techniques for Searches on Encrypted Data,” in Proc. of IEEE

S&P, DC, USA, 2000, pp. 44-55.

R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved

definitions and efficient constructions,” J. Comput.Secur., vol. 19, no. 5, pp. 895-934, 2011.

S. Kamara, C. Papamanthou, and T. Roeder, “Dynamic Searchable Symmetric Encryption,” in Proc. of ACM

CCS, Raleigh, NC, USA, 2012, pp. 965–976.

S. Kamara, C. Papamanthou, “Parallel and dynamic searchable symmetric encryption,” Financial

Cryptography and Data Security, Springer Berlin Heidelberg, 2013, pp. 258-274.

G. S. Poh, J.–J. Chin, W.-C. Yau, K.-K. R. Choo, and M. S. Mohamad, “Searchable Symmetric Encryption:

Designs and Challenges,” ACM Comput. Surv. vol. 50, no. 3, pp. 40:1-40:37, 2017.