Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary


Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Privacy model to secure Chronical big data: Fog Computing

Mr. Yogesh R. Chikane, Dr. Rashmi Soni, , ,
Affiliations
Research Scholar, Department of Computer Science and Engineering Oriental University, Indore
:10.22362/ijcert/2022/v9/i10/v9i1004


Abstract
With the tremendous growth in medical data, there are increasing opportunities in the healthcare sector. In this research, the main focus is on providing the current stage of disease and securing sensitive data on the cloud. After taking the patient's input in the form of symptoms of a chronic disease, we are going to make test suggestions. Parameters that are obtained from the results of the tests are mapped to ideal values stored in the database. After mapping a stage of chronic disease, a report will be provided to the patient, and the report will be stored on the cloud in encrypted format. All this data management is done in the cloud, and only solutions are saved there. Fog computing gives fast storage and processing to correspondence benefits near the end client. It is used mainly for reducing latency. Latency is nothing but improvement time. Fog computing is also used to deliver protection by making use of decoy files. The decoy file contains fake or incorrect information that is used to mislead the attacker. It is given to unauthorized access. In this paper, the main focus is on providing the current stage of disease and securing the sensitive data of a patient, which is stored in the cloud. After taking the input in the form of text from the patient, we are going to map this information with ideal values stored in the database. All this data processing is done in the cloud, and only the results are stored there. Fog computing provides storage, processing, and communication services close to the end user. It is used mainly for reducing latency. Healthcare cloud computing faces security issues such as data theft attacks. To decrease the value of these data theft attacks, encryption and decryption are used, and additional security is provided by placing decoy files in the fog. The decoy file contains incorrect information, which we are giving to the attacker after successful decryption


Citation
Yogesh R. Chikane and Rashmi Soni."Privacy model to secure Chronical big data: Fog Computing". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.9, Issue 10,pp.206-215, October - 2022,


Keywords : Cloud computing& Fog Computing, Decoy file, Medical data, Big data.

References
[1] Gorlatova, Maria & Inaltekin, Hazer & Chiang, Mung. (2018). Characterizing Task Completion Latencies in Fog Computing.
[2] Ling, Tonghua & He, Wenchao & Liu, Xianjun & Zhang, Sheng & Huang, Fu & Hua, Fei. (2022). Fine grid model for the dielectric characteristics of ground?penetrating radar in mixed media. Geophysical Prospecting. 70. 10.1111/1365-2478.13214.
[3] Michael, Dennis & Indrajit, Richardus & Dazki, Erick. (2022). Implementation of Enterprise Architecture in Cloud Computing Companies. Sinkron. 7. 549-559. 10.33395/sinkron.v7i2.11407.
[4] Banger, Nanda & K, Pallavi & Shetty, Mrs. (2022). A Review Paper on Cloud Computing Architecture, Types, Advantages and Disadvantages. International Journal of Advanced Research in Science, Communication and Technology. 14-22. 10.48175/IJARSCT-3144.
[5] Ramesh, Varsha & Nair, Siddharth & Tyagi, Amit. (2022). The Fog/Edge Computing: Challenges, Serious Concerns, and the Road Ahead. 10.1002/9781119792437.ch16.
[6]  Maloth, Bhav Singh & Anusha, R. & Reddy, R. & Devi, S.Chaya. (2013). Augmentation of Information Security by Cryptography in Cloud Computing. www.ijcst.com. 4.
[7] Deokar, Sanjivani & Mangla, Monika & Akhare, Rakhi. (2021). A Secure Fog Computing Architecture for Continuous Health Monitoring. 10.1007/978-3-030-46197-3_11.
[8 Lin, Rongheng & Ye, Zezhou & Wang, Hao & Wu, Budan. (2018). Chronic Diseases and Health Monitoring Big Data: A Survey. IEEE Reviews in Biomedical Engineering. PP. 1-1. 10.1109/RBME.2018.2829704.
[9] Hamid, Hadeal & Rahman, Sk Md Mizanur & Hossain, M. Shamim & Almogren, Ahmad & Alamri, Atif. (2017). A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography. IEEE Access. PP. 1-1. 10.1109/ACCESS.2017.2757844.
[10] Kurikala, Geetha & Koppuravuari, Gurnadha & Swapna, A. (2017). Fog Computing : Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology. International Journal of Scientific Research in Computer Science Engineering and Information Technology. 4. 2456-3307.
[11] Vishwanath, Akhilesh & Peruri, Ramya & He, Jing. (2016). Security in Fog Computing through Encryption. International Journal of Information Technology and Computer Science. 8. 28-36. 10.5815/ijitcs.2016.05.03.
[12] Kraemer, Frank & Bråten, Anders & Tamkittikhun, Nattachart & Palma, David. (2017). Fog Computing in Healthcare – A Review and Discussion. IEEE Access. PP. 9206-9222. 10.1109/ACCESS.2017.2704100.
[13] Mouradian, Carla & Naboulsi, Diala & Yangui, Sami & Glitho, Roch & Morrow, Monique & Polakos, Paul. (2017). A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges. IEEE Communications Surveys & Tutorials. PP. 10.1109/COMST.2017.2771153.
[14] Vishwanath, Akhilesh & Peruri, Ramya & He, Jing. (2016). Security in Fog Computing through Encryption. International Journal of Information Technology and Computer Science. 8. 28-36. 10.5815/ijitcs.2016.05.03.
[15] Alexandru, Adriana & Coardos, Dora. (2016). Big Data în Healthcare and Medical Applications in România. Big Data în Healthcare and Medical Applications in România.
[16] Abouelmehdi, Karim & Beni-Hessane, Abderrahim & Khaloufi, Hayat. (2018). Big healthcare data: preserving security and privacy. Journal of Big Data. 5. 10.1186/s40537-017-0110-7. 
[17] Geetha Kurikala, K Gurnadha Gupta, A. Swapna.(2017). Fog Computing: Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology.” 2(4).
[18] Malek Ben Salem and Salvatore J. Stolfo(2011). Decoy Document Deployment for Effective Masquerade Attack Detection. 7. 
[19] Nisha Peter. (2015 ). Fog Computing and Its Real Time Applications. International Journal of Emerging Technology and Advanced Engineering, 7.
 [20] Mohamed Firdhous, Osman Ghazali and Suhaidi Hassan. “Fog Computing: Will It Be the Future of Cloud Computing?” ISBN: 978-1-941968-00-0, 2014.
[21]  Komal Thorat, Shweta Dawkhar, Mansi Kulkarni, Samiksha Wale (2020). Preserving the Privacy of Chronical Big Data Using Fog and Cloud Computing.9(6).


DOI Link : https://doi.org/10.22362/ijcert/2022/v9/i10/v9i1004

Download :
  V9I1004.pdf


Refbacks : Currently there are no Refbacks

Announcements


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events


Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.


Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.


IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert


IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)


Emerging Sources Citation Index (in process)


IJCERT title is under evaluation by Scopus.


Key Dates


☞   INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞   LAST DATE OF SUBMISSION : 31st March 2023
☞  SUBMISSION TO FIRST DECISION :
In 7 Days
☞  FINAL DECISION :
IN 3 WEEKS FROM THE DAY OF SUBMISSION

Important Announcements


All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index


Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)


Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links



Conference Proposal




DOI:10.22362/ijcert