An Effective Paillier Encryption for Health Data with Cloud Storage and Prediction Using RNN
International Journal of Electrical and Electronics Engineering |
© 2024 by SSRG - IJEEE Journal |
Volume 11 Issue 12 |
Year of Publication : 2024 |
Authors : R. Sahila Devi, Govinda Patil, D. Srinivasa Rao, Jitendra Choudhary, Sriram Gopalam, Priyanka Parmar |
How to Cite?
R. Sahila Devi, Govinda Patil, D. Srinivasa Rao, Jitendra Choudhary, Sriram Gopalam, Priyanka Parmar, "An Effective Paillier Encryption for Health Data with Cloud Storage and Prediction Using RNN," SSRG International Journal of Electrical and Electronics Engineering, vol. 11, no. 12, pp. 399-405, 2024. Crossref, https://doi.org/10.14445/23488379/IJEEE-V11I12P136
Abstract:
An emerging technology in data analytics, Cloud Computing (CC) is used to store, retrieve, and distribute data in a dispersed setting. Both individuals and businesses save their data on cloud servers. However, data privacy and security have become a rising problem that limits the organization from employing cloud services. In order to overcome that problem, the Paillier encryption method is proposed to offer safety for healthcare cloud data. Creating a pair of keys offers a comparatively easier method to ward against attacks and safeguard data confidentiality. Following data selection, the Paillier methodology is used to encrypt the input. The encoded health data were then kept in cloud environments, where they provided better read-write storage operations. The Paillier method is used in the data decryption procedure to get the data from the cloud environment. A Recurrent Neural Network (RNN) classifier is employed in healthcare diagnosis to categorize and forecast a patient’s ailment, after which the diagnosis is communicated to the patient and physician. The proposed work uses Python software, and a comparative analysis is conducted. An effective prediction using RNN showcases an accuracy of 96.4% with a better performance matrix. After classification, the outcomes are conveyed to patients and doctors for treatment.
Keywords:
Cloud computing, Healthcare data, Paillier method, RNN, Diagnosis.
References:
[1] Asad Abbas et al., “Blockchain-Assisted Secured Data Management Framework for Health Information Analysis Based on Internet of Medical Things,” Personal and ubiquitous computing, vol. 28, no. 1, pp. 59-72, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] P. Blessed Prince, and S. P. Jeno Lovesum, “Privacy Enforced Access Control Model for Secured Data Handling in Cloud-Based Pervasive Health Care System,” SN Computer Science, vol. 1, no. 5, pp. 239, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] G. Muneeswari et al., “Self-Diagnosis Platform Via IOT-based Privacy Preserving Medical Data,” Measurement: Sensors, vol. 25, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Lidia Ogiela, Marek R. Ogiela, and Hoon Ko, “Intelligent Data Management and Security in Cloud Computing,” Sensors, vol. 20, no. 12, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] J. Deepika, C. Rajan, and T. Senthil, “Security and Privacy of Cloud-and IOT-Based Medical Image Diagnosis Using Fuzzy Convolutional Neural Network,” Computational Intelligence and Neuroscience, pp. 1-17, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Ali I. Siam et al., “Secure Health Monitoring Communication Systems Based on IOT and Cloud Computing for Medical Emergency Applications,” Computational Intelligence and Neuroscience, vol. 2021, no. 1, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] P. Chinnasamy et al., “Efficient Data Security Using Hybrid Cryptography on Cloud Computing,” In Inventive Communication and Computational Technologies: Proceedings of ICICCT, Springer, Singapore, pp. 537-547, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Feras M. Awaysheh et al., “Security by Design for Big Data Frameworks over Cloud Computing,” IEEE Transactions on Engineering Management, vol. 69, no. 6, pp. 3676-3693, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Muhammad Tahir et al., “CryptoGA: a Cryptosystem Based on Genetic Algorithm for Cloud Data Security,” Cluster Computing, vol. 24, no. 2, pp. 739-752, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Samira Akhbarifar et al., “A Secure Remote Health Monitoring Model for Early Disease Diagnosis in Cloud-Based IOT Environment,” Personal and Ubiquitous Computing, vol. 27, no. 3, pp. 697-713, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] M. Mehrtak et al., “Security Challenges and Solutions Using Healthcare Cloud Computing,” Journal of medicine and life, vol. 14, no. 4, pp. 448, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] K. Suresha, and P. Vijaya Karthick, “Enhancing Data Security in Cloud Computing Using Threshold Cryptography Technique,” Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies, pp. 231-242, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Javad Pool et al., “Systematic Analysis of Failures in Protecting Personal Health Data: A Scoping Review,” International Journal of Information Management, vol. 1, no. 74, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Maryam Shabbir et al., “Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing,” IEEE Access, vol. 9, pp. 8820-8834, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Fursan Thabit et al., “A New Lightweight Cryptographic Algorithm for Enhancing Data Security in Cloud Computing,” Global Transitions Proceedings, vol. 2, no. 1, pp. 91-99, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Mohan Naik Ramachandra et al., “An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard,” Big Data and Cognitive Computing, vol. 6, no. 4, pp. 1-20, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Lin Teng et al., “A Modified Advanced Encryption Standard for Data Security,” International Journal of Network Security, vol. 22, no. 1, pp. 112-117, 2020.
[Google Scholar] [Publisher Link]
[18] Alireza Souri et al., “A New Machine Learning-Based Healthcare Monitoring Model for Student’s Condition Diagnosis in Internet of Things Environment,” Soft Computing, vol. 24, no. 22, pp. 17111-17121, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Ankita Anand et al., “An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IOT Healthcare Applications,” Sensors, vol. 21, no. 19, pp.1-23, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] K.V. Praveen et al., “Deep Learning Based Intelligent and Sustainable Smart Healthcare Application in Cloud-Centric IOT,” Computers, Materials & Continua, vol. 66, no. 2, pp. 1987-2003, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Dhirendra K.R. Shukla, Vijay K.R. Dwivedi, and Munesh C. Trivedi, “Encryption Algorithm in Cloud Computing,” Materials Today: Proceedings, vol. 37, pp. 1869-1875, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Alabi Orobosade et al., “Cloud Application Security Using Hybrid Encryption,” Communications on Applied Electronics, vol. 7, no. 33, pp. 25-31, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Prabal Verma, Sandeep K. Sood, and Sheetal Kalra, “Cloud-Centric IoT Based Student Healthcare Monitoring Framework,” Journal of Ambient Intelligence and Humanized Computing, vol. 9, no. 5, pp. 1293-1309, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Greeshmanth Ch. Rupa, and Mohd Asif Shah, “Novel Secure Data Protection Scheme Using Martino Homomorphic Encryption,” Journal of Cloud Computing, vol. 12, no. 1, 2023.
[CrossRef] [Google Scholar] [Publisher Link]