Privacy model to secure Chronical big data: Fog Computing

Main Article Content

Yogesh R. Chikane
Rashmi Soni

Abstract

With the tremendous growth in medical data, there are increasing opportunities in the healthcare sector. In this research, the main focus is on providing the current stage of disease and securing sensitive data on the cloud. After taking the patient's input in the form of symptoms of a chronic disease, we are going to make test suggestions. Parameters that are obtained from the results of the tests are mapped to ideal values stored in the database. After mapping a stage of chronic disease, a report will be provided to the patient, and the report will be stored on the cloud in encrypted format. All this data management is done in the cloud, and only solutions are saved there. Fog computing gives fast storage and processing to correspondence benefits near the end client. It is used mainly for reducing latency. Latency is nothing but improvement time. Fog computing is also used to deliver protection by making use of decoy files. The decoy file contains fake or incorrect information that is used to mislead the attacker. It is given to unauthorized access. In this paper, the main focus is on providing the current stage of disease and securing the sensitive data of a patient, which is stored in the cloud. After taking the input in the form of text from the patient, we are going to map this information with ideal values stored in the database. All this data processing is done in the cloud, and only the results are stored there. Fog computing provides storage, processing, and communication services close to the end user. It is used mainly for reducing latency. Healthcare cloud computing faces security issues such as data theft attacks. To decrease the value of these data theft attacks, encryption and decryption are used, and additional security is provided by placing decoy files in the fog. The decoy file contains incorrect information, which we are giving to the attacker after successful decryption

Article Details

How to Cite
[1]
Yogesh R. Chikane and Rashmi Soni, “Privacy model to secure Chronical big data: Fog Computing”, Int. J. Comput. Eng. Res. Trends, vol. 9, no. 10, pp. 206–215, Oct. 2022.
Section
Research Articles

References

Gorlatova, Maria & Inaltekin, Hazer & Chiang, Mung. (2018). Characterizing Task Completion Latencies in Fog Computing.

Ling, Tonghua & He, Wenchao & Liu, Xianjun & Zhang, Sheng & Huang, Fu & Hua, Fei. (2022). Fine grid model for the dielectric characteristics of ground?penetrating radar in mixed media. Geophysical Prospecting. 70. 10.1111/1365-2478.13214.

Michael, Dennis & Indrajit, Richardus & Dazki, Erick. (2022). Implementation of Enterprise Architecture in Cloud Computing Companies. Sinkron. 7. 549-559. 10.33395/sinkron.v7i2.11407.

Banger, Nanda & K, Pallavi & Shetty, Mrs. (2022). A Review Paper on Cloud Computing Architecture, Types, Advantages and Disadvantages. International Journal of Advanced Research in Science, Communication and Technology. 14-22. 10.48175/IJARSCT-3144.

Ramesh, Varsha & Nair, Siddharth & Tyagi, Amit. (2022). The Fog/Edge Computing: Challenges, Serious Concerns, and the Road Ahead. 10.1002/9781119792437.ch16.

Maloth, Bhav Singh & Anusha, R. & Reddy, R. & Devi, S.Chaya. (2013). Augmentation of Information Security by Cryptography in Cloud Computing. www.ijcst.com. 4.

Deokar, Sanjivani & Mangla, Monika & Akhare, Rakhi. (2021). A Secure Fog Computing Architecture for Continuous Health Monitoring. 10.1007/978-3-030-46197-3_11.

Lin, Rongheng & Ye, Zezhou & Wang, Hao & Wu, Budan. (2018). Chronic Diseases and Health Monitoring Big Data: A Survey. IEEE Reviews in Biomedical Engineering. PP. 1-1. 10.1109/RBME.2018.2829704.

Hamid, Hadeal & Rahman, Sk Md Mizanur & Hossain, M. Shamim & Almogren, Ahmad & Alamri, Atif. (2017). A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography. IEEE Access. PP. 1-1. 10.1109/ACCESS.2017.2757844.

Kurikala, Geetha & Koppuravuari, Gurnadha & Swapna, A. (2017). Fog Computing : Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology. International Journal of Scientific Research in Computer Science Engineering and Information Technology. 4. 2456-3307.

Vishwanath, Akhilesh & Peruri, Ramya & He, Jing. (2016). Security in Fog Computing through Encryption. International Journal of Information Technology and Computer Science. 8. 28-36. 10.5815/ijitcs.2016.05.03.

Kraemer, Frank & Bråten, Anders & Tamkittikhun, Nattachart & Palma, David. (2017). Fog Computing in Healthcare – A Review and Discussion. IEEE Access. PP. 9206-9222. 10.1109/ACCESS.2017.2704100.

Mouradian, Carla & Naboulsi, Diala & Yangui, Sami & Glitho, Roch & Morrow, Monique & Polakos, Paul. (2017). A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges. IEEE Communications Surveys & Tutorials. PP. 10.1109/COMST.2017.2771153.

Vishwanath, Akhilesh & Peruri, Ramya & He, Jing. (2016). Security in Fog Computing through Encryption. International Journal of Information Technology and Computer Science. 8. 28-36. 10.5815/ijitcs.2016.05.03.

Alexandru, Adriana & Coardos, Dora. (2016). Big Data în Healthcare and Medical Applications in România. Big Data în Healthcare and Medical Applications in România.

Abouelmehdi, Karim & Beni-Hessane, Abderrahim & Khaloufi, Hayat. (2018). Big healthcare data: preserving security and privacy. Journal of Big Data. 5. 10.1186/s40537-017-0110-7.

Geetha Kurikala, K Gurnadha Gupta, A. Swapna.(2017). Fog Computing: Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology.” 2(4).

Malek Ben Salem and Salvatore J. Stolfo(2011). Decoy Document Deployment for Effective Masquerade Attack Detection. 7.

Nisha Peter. (2015 ). Fog Computing and Its Real Time Applications. International Journal of Emerging Technology and Advanced Engineering, 7.

Mohamed Firdhous, Osman Ghazali and Suhaidi Hassan. “Fog Computing: Will It Be the Future of Cloud Computing?” ISBN: 978-1-941968-00-0, 2014.

Komal Thorat, Shweta Dawkhar, Mansi Kulkarni, Samiksha Wale (2020). Preserving the Privacy of Chronical Big Data Using Fog and Cloud Computing.9(6).