scholarly journals A Combined Clustering and Geometric Data Perturbation Approach for Enriching Privacy Preservation of Healthcare Data in Hybrid Clouds

2018 ◽  
Vol 11 (1) ◽  
pp. 201-210 ◽  
Author(s):  
Vulapula Reddy ◽  
◽  
Barige Rao ◽  
2013 ◽  
Vol 10 (3) ◽  
pp. 1427-1433 ◽  
Author(s):  
M. Naga Lakshmi ◽  
Dr. K Sandhya Rani

Privacy preservation is a major concern when the application of data mining techniques to large repositories of data consists of personal, sensitive and confidential information. Singular Value Decomposition (SVD) is a matrix factorization method, which can produces perturbed data by efficiently removing unnecessary information for data mining. In this paper two hybrid methods are proposed which takes the advantage of existing techniques SVD and geometric data transformations in order to provide better privacy preservation. Reflection data perturbation and scaling data perturbation are familiar geometric data transformation methods which retains the statistical properties in the dataset. In hybrid method one, SVD and scaling data perturbation are used as a combination to obtain the distorted dataset. In hybrid method two, SVD and reflection data perturbation methods are used as a combination to obtain the distorted dataset. The experimental results demonstrated that the proposed hybrid methods are providing higher utility without breaching privacy.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Telecare Medicine Information System (TMIS) is now attracting field for remote healthcare, diagnosis and emergency health services etc. The major objective of this type of system is to provide medical facilities to patients who are critically ill and unable to attend hospitals or put in isolation for observations. A major challenge of such systems is to securely transmit patients' health related information to the medical server through an insecure channel. This collected sensitive data is further used by medical practitioners for diagnosis and treatment purposes. Therefore, security and privacy are essential for healthcare data. In this paper, a robust authentication protocol based on Chebyshev Chaotic map has been proposed for adequate security while transmitting data. The privacy preservation is maintained by a rule set which mainly controls the views. A detailed security analysis was performed for the proposed scheme.


Sign in / Sign up

Export Citation Format

Share Document