A REVIEW ON BIG DATA PRIVACY AND SECURITY IN HEALTH CARE

Authors

  • Prabu Sankar N Dr. M.G.R. Educational & Research Institute
  • D.Usha Dept.of CSE, Dr. M.G.R. Educational and Research Institute

DOI:

https://doi.org/10.63458/ijerst.v1i1.61

Keywords:

Big Data, Analytics, Security, Privacy, Confidentiality

Abstract

Due to the proliferation of the Internet, IoT, and Cloud Computing, there is now an abundance of virtual data in every industry, field of study, and government agency. Big data has quickly become a topic of intense interest, garnering media coverage and commentary from all over the world. Data privacy and security in Big Data is a pressing concern. The 5Vs of big data—size, velocity, value, veracity, and variety—lower the bar for adequate protection. This paper aimed to draw attention to security and privacy issues and challenges associated with Big Data in healthcare, the resolution of which could result in a more secure data processing and computing infrastructure. This paper also provides a high-level overview of the K-Anonymity technique for protecting the privacy of large datasets before they are released for analysis, with the goal of preventing the disclosure of personally identifiable information. In conclusion, this paper summarizes the functions and features of the best big data security solutions offered by industry leaders.

References

Jha A, Dave M. and Madan, S. A Review on the Study and Analysis of Big Data using Data Mining Techniques, International Journal of Latest Trends in Engineering and Technology (IJLTET), vol.6(3), 2016.

Jha A, Dave, M. and Madan, S. Quantitative Analysis and Interpretation of Big Data Variables in Crime Using R, International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), vol5(7), 2016.

Q, Jing. Security of the internet of things: perspectives and challenges. Vol.20(8), pp.481–50., 2016.

De la Torre, Isabel; García-Zairian, Begoña; and López-Coronado, Miguel. Analysis of Security in Big Data Related to

Healthcare," Journal of Digital Forensics, Security and Law. Vol.12(3), 2017. DOI: https://doi.org/10.15394/jdfsl.2017.1448

Saurabh Pandey, Rashmi Pandey. Medical (Healthcare) Big Data Security and Privacy Issues International Journal of Scientific & Engineering Research, vol.9(2), 2018.

W. Nicholson Price, II, JD, PhD and I. Glenn Cohen, JD. Privacy in the Age of Medical Big Data” Nat Med. 2019

January; vol.25(1), pp. 37–43, 2019.https://cloudsecurityalliance.org/media/news/csa-big-data-releases-top-10-security-privacy challenges/.

A Cloud Security Alliance Collaborative research, Expanded Top Ten Big Data Security and Privacy Challenges. 2013.

Okman, L., Gal-Oz N., Gonen Y, Gudas E. and Abramov J. Security Issues in NoSQL Databases in Trust Com IEEE Conference on International Conference on Trust, Security and Privacy in Computing and Communications, pp.541-547,2011.

Apparao, Yannam and Laxminarayan Amma, Kadiyala. Security Issue on Secure Data Storage and Transaction Logs In

Big Data” in International Journal of Innovative Research in Computer Science & Technology (IJIRCST). 2015.

Singh, Reena and KunverArif Ali. 2016. Challenges and Security Issues in Big Data Analysis, IJIRSET, vol 5(1), 2016.

Sedayao J, Bhardwaj R. Making big data, privacy, and anonymization work together in the enterprise: experiences and

issues. In: Big data congress. 2014.

Jung K, Park S, Park S. Hiding a needle in a haystack: privacy preserving Apriori algorithm in MapReduce framework

PSBD’14, Shanghai. pp. 11–17, 2014.

Lu R, Zhu H, Liu X, Liu JK, Shao J. Toward efficient and privacy-preserving computing in big data era. IEEE Netw. vol.28, pp. 46–50,2014.

Microsoft differential privacy for everyone. 2015. http://download.microsoft.com/…/Differential_Privacy_for_Everyone.pdf.

Zhang X, Yang T, Liu C, Chen J. A scalable two-phase top-down specialization approach for data anonymization using systems, in MapReduce on cloud. IEEE Trans Parallel Distrib. vol.25(2), pp. 63–73, 2014.

Mehmood A, Natgunanathan I, Xiang Y, Hua G, Guo S. Protection of big data privacy. In: IEEE translations and content mining are permitted for academic research. 2016.

Mohammadian E, Noferesti M, Jalili R. FAST: fast anonymization of big data streams. In: ACM proceedings of the 2014 international conference on big data science and computing, article 1. 2014.

Xu K, Yue H, Guo Y, Fang Y. Privacy-preserving machine learning algorithms for big data systems. In: IEEE 35th international conference on distributed systems. 2015.

Wei L, Zhu H, Cao Z, Dong X, Jia W, Chen Y, Vasilakos AV. Security and privacy for storage and computation in cloud computing. Inf Sci. 2014;258:371–86, 2014

Zhang R, Liu L. Security models and requirements for healthcare application clouds. In: IEEE 3rd international conference on cloud computing, 2010.

Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowle Based Syst, vol.;10, pp.571–588,2002

Samrati P. Protecting respondents’ identities in micro data release. IEEE Trans Knowle Data Eng. vol.13, pp.10–27, 2001.

Truta TM, Vinay B. Privacy protection: p-sensitive k-anonymity property. In: Proceedings of 22nd international conference on data engineering workshops. pp. 94, 2006.

Spruill N. The confidentiality and analytic usefulness of masked business microdata. In: Proceedings on survey research methods. pp. 602–607,1983.

Chawala S, Dwork C, Sheny FM, Smith A, Wee H. Towards privacy in public databases. In: Proceedings on second theory of cryptography conference. 2005.

Science Applications International Corporation (SAIC). Role-based access control (RBAC) Role Engineering Process Version 3.0., 2004.

Zhou H, Wen Q. Data security accessing for HDFS based on attribute-group in cloud computing. In: International conference on logistics engineering, management, and computer science (LEMCS 2014). 2014.

Linden H, Kalra D, Hasman A, Talmon J. Inter-organization future proof HER systems—a review of the security and privacy related issues. Int J Med Inform. 2009; 78:141–60, 2009.

Marchal S, Xiuyan J, State R, Engel T. “A big data architecture for large scale security monitoring”, Big Data (BigData

Congress), Anchorage, AK. pp. 56–63,2014.

Duygu ST, Ramazan T, Seref S. A survey on security and privacy issues in big data. In: The 10th international conference for internet technology and secured transactions (ICITST-2015). 2015.

Liu L, Lin J. Some special issues of network security monitoring on big data environments. Dependable, Autonomic and Secure Computing (DASC), Chengdu. pp.10–5, 2013.

KenigBatya andTassaTamir. A practical approximation algorithm for optimal k-anonymity, Data Mining Knowledge Discovery, Springer. 2011.

Sweeney, L. K-Anonymity: A Model for Protecting Privacy, International Journal on Uncertainty Fuzziness

Knowledge based Systems. 2002.

Samarati. P. Protecting respondents’ identities in microdata release. IEEE Trans. on Knowledge and Data Eng., vol.13, pp.1010–1027, 2001.

https://www-01.ibm.com/software/se/security/bigdata/

https://msdn.microsoft.com/en-us/library/dn749804.aspx

https://docs.oracle.com/cd/E76178_01/

https://www.thalesesecurity.com/products/data-encryption/vormetric-data-security-platform

Downloads

Published

2023-09-25

How to Cite

N, P. S., & D.Usha. (2023). A REVIEW ON BIG DATA PRIVACY AND SECURITY IN HEALTH CARE. International Journal of Engineering Research and Sustainable Technologies (IJERST), 1(1), 38–49. https://doi.org/10.63458/ijerst.v1i1.61

ARK