A privacy protection model for health care big data based on trust evaluation access control in cloud service environment

2020 ◽  
Vol 38 (3) ◽  
pp. 3167-3178 ◽  
Author(s):  
Xiaohan Hu ◽  
Rong Jiang ◽  
Mingyue Shi ◽  
Jingwei Shang
2019 ◽  
Vol 23 (3) ◽  
pp. 427-442 ◽  
Author(s):  
Mingyue Shi ◽  
Rong Jiang ◽  
Xiaohan Hu ◽  
Jingwei Shang

2020 ◽  
Vol 12 ◽  
pp. 184797901989744 ◽  
Author(s):  
Panjun Sun

Recently, more and more network fraud incidents have damaged the interests of cloud service traders. To enhance mutual trust and win–win cooperation between the users and the cloud service provider, in the article, we construct a trust access control model for cloud services. First, we propose a trust evaluation method based on direct trust, trust risk, feedback trust, reward penalty, and obligation trust to express the complexity and uncertainty of trust relationship. Second, we propose trust evaluation and weight algorithm of trust factor by information entropy and maximum dispersion; therefore, our model has a better scientific and higher practical application value. Finally, we design related comparative experiments of three models to verify the efficiency, success rate, accuracy of trust evaluation, and privacy disclosure date, and these results show that our research performance is quite superior.


2018 ◽  
Vol 7 (4.10) ◽  
pp. 504
Author(s):  
K. Kavitha ◽  
D. Anuradha ◽  
P. Pandian

Huge amount of health care data are available online to improve the overall performance of health care system. Since this huge health care Big-data is valuable and sensitive, it requires safety. In this paper we analyze numerous ways in which the health care Big-data can be protected. In recent days many augmented security algorithm that are suitable for Big-data have emerged like, El-Gamal, Triple-DES, and Homomorphic algorithms. Also authentication and access control can be implemented over Big-data using Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) schemes.Along with security to Big-data we try to evolve the ways in which the valuable Big-data can be optimized to improve the Big-data analysis. Mathematical optimization techniques such as simple and multi-purpose optimization and simulation are employed in Big-data to maximize the patient satisfaction and usage of doctor’s consulting facility. And also, to minimize the cost spent by patient and energy wasted.  


2017 ◽  
Vol 6 (3) ◽  
pp. 13-36
Author(s):  
Mathieu Guillermin ◽  
Thierry Magnin

Abstract Big data techniques, data-driven science and their technological applications raise many serious ethical questions, notably about privacy protection. In this paper, we highlight an entanglement between epistemology and ethics of big data. Discussing the mobilisation of big data in the fields of biomedical research and health care, we show how an overestimation of big data epistemic power – of their objectivity or rationality understood through the lens of neutrality – can become ethically threatening. Highlighting the irreducible non-neutrality at play in big data tools, we insist upon the ethical importance of a critical epistemological approach in which big data are understood as possibly valuable only when coupled with human intelligence and evaluative rationality.


2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Sun Pan Jun

In order to promote mutual trust and win-win cooperation between the users and the providers, we propose a trust-game-based access control model for cloud service in the paper. First, we construct a trust evaluation model based on multiple factors, such as the direct trust, feedback trust, reward punishment, and trust risk and further propose a weight method by maximum discrete degree and information entropy theory; second, we combine trust evaluation with the payoff matrix for game analysis and calculate the mixed Nash equilibrium strategy for the users and service providers; third, we give the game control condition based on trust level prediction and payment matrix to encourage participants to make honest strategy. Experimental results show that our research has good effect in terms of acceptance probability, deception probability, accuracy of trust evaluation, and cooperation rate in the cloud service.


Author(s):  
Santosh Kumar Sharma, Et. al.

Big Data As A Service Is Used In Today’s Scenario To Handle And Process The Big Amount Of Data Which Are Generated From Different Source Every Day. Since Data Is Stored On The Cloud Platform, The System Could Suffer A Failure And Give Attackers The Opportunity To Launch Various Categories Of Attacks.Manyresearcheshave Been Done In This Domain To Provide Security And Protection To The Data On Cloud. The Blockchain Technology Is A Secure, Distributed And Privacy-Preserving Decentralized Ledger Where The Transactions Are Flexible, Secure,Verifiable And Permanent Way.Here, The Transaction Data Is Encrypted Andkept In A Wrapped Block (I.E., Record) Which Are Spreadthrough The N/W In A Provable And Unabashedmode Across The Entire Network To Enhance Information Security And Data Privacy. In This Paperwe Have Proposed A Framework For An Access Control With Privacy Protection In Bdaas Based On Blockchain  Technology. Here Blockchain Technology Is Used Only For Storing The Transaction Log Information Whenever Any Kind Of Event Log Occurred In System.


2009 ◽  
Vol 29 (6) ◽  
pp. 1636-1639
Author(s):  
Bo LANG ◽  
Kai LEI ◽  
Chuan JIANG ◽  
Jing-hui ZHANG

Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Sign in / Sign up

Export Citation Format

Share Document