Survey on Security Issues in Decision Support System of Health Care Network
Keywords:
Medical Cyber Physical Systems, Secure Digital Cover, Confidentiality, Homomorphic EncryptionAbstract
Medical Secure Systems (MSSs) are spoken to by incorporating count and also physical procedures. The theories and uses of MSSs confront the huge issues. The main objective of this study is to give a more prominent comprehension summary of this developing techniques focusing on the security of the outsourced medical data. In this system, the main focus is on secure data transmission of medical data. Such system is called as Medical Secure Systems (MSS). It can transmit and process the data gathered from health observing systems, which comprises of BAN. The obtained data is transmitted to the private or open cloud which contains a set of calculations for investigating the patient data. These medical data oughts to be kept the mystery. In the wake of breaking down these data, the input is given to the specialists to make a remedial move. This system incorporates data obtaining which is fit for gaining data from body territory systems, data conglomeration which focuses the accumulated flag data, cloud preparing which incorporates numerous examination calculations and activity layer which create either physical activity or choice help. In this paper, we will talk about different issues that should be considered to satisfying the security and privacy necessities and furthermore examine about the important components and wordings utilized by the different specialists to illuminate those issues.
References
- Ovunc Kocabas, Tolga Soyata, and Mehmet K. Aktas, “Emerging Security Mechanisms for Medical Cyber Physical Systems”, IEEE/ACM transactions on computational biology andbio-informatics, vol. 13, no. 3, may/june2016.
- Phaneendra Kumar, Dr.S. V. A.V.Prasad ,Arvind Patak, “Design and Implementation of M-Health System by Using Cloud Computing”, Future Gener. Comput.Syst.,Vol. 5, Issue 5,May 2016.
- Tran Viet Xuan Phuong, Guomin Yang, Member, IEEE, and Willy Susilo, Senior Member, IEEE, “Hidden Ciphertext Policy Attribute- Based Encryption Under Standard Assumptions”,IEEE transactions on information forensics and security, vol. 11, no. 1, January 2016.
- Xin Sun, Fu-Shing Sun, “A Hybrid Approach to Detect Traffic Anomalies in Large-Scale Data Networks”, Conference on Computational Science and Computational Intelligence, 2016.
- Ovunc Kocabas, Tolga Soyata, “Utilizing Homomorphic Encryption to Implement Secure and Private Medical Cloud Computing”, 2015 IEEE 8th International Conference on Cloud Computing.
- A. Page, O. Kocabas, T. Soyata, M. K. Aktas, and J. Couderc, ―Cloud-based privacy-preserving remote ECG monitoring and surveillance, Ann. Non-invasive Electrocardiol., vol. 20, no. 4, pp. 328–337, 2014.
- M. Hassanalieragh, A. Page, T. Soyata, G. Sharma, M. K. Aktas, G. Mateos, B. Kantarci, and S. Andreescu, ―Health monitoring and management using internet-of-things (IoT) sensing with cloud-based processing: Opportunities and challenges, in Proc. IEEE Int. Conf. Serv. Comput., Jun. 2015, pp. 285–292.
- N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, ―Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222–233, Jan. 2014.
- S. Dziembowski and K. Pietrzak, ―Leakage-resilient cryptography, in Proc. IEEE 49th Annu. IEEE Symp. Found. Comput. Sci., 2008, pp. 293–302.
- Y. Zhou and D. Feng, ―Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing. IACR Cryptol. ePrint Archive, vol. 2005, p. 388, 2005.
- P. L. Montgomery, ―Speeding the pollard and elliptic curve methods of factorization, Math. Comput., vol. 48, no. 177, pp. 243–264, 1987.
- J. L opez and R. Dahab, ―Fast multiplication on elliptic curves over GF (2m) without pre-computation, in Proc. Cryptographic Hardw. Embedded Syst., 1999, pp. 316–327.
- T. S. Messerges, ―Securing the aes finalists against power analysis attacks, in Proc. Fast Softw. Encryption, 2001, pp. 150–164.
- X. Yao, Z. Chen, and Y. Tian, “A lightweight attribute-based encryption scheme for the internet of things”, Future Gener. Comput. Syst., vol. 49, pp. 104-112, 2015.
- O. Kocabas and T. Soyata, “Towards privacy-preserving medical cloud computing using homomorphic encryption”, in Enabling Real-Time Mobile Cloud Computing through Emerging Technologies, T. Soyata, Ed. Hershey, PA, USA: IGI Global, 2015, ch. 7, pp. 213-246.
- Abdelghani Benharref and Mohamed Adel Serhani, “Novel Cloud and SOA-Based Framework forE-Health Monitoring Using Wireless Biosensors”, IEEE journal of biomedical and health informatics, vol. 18, no. 1, January 2014
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.