Skip to main content

Hierarchical Metadata-Based Secure Data Retrieval Technique for Healthcare Application

  • Conference paper
  • First Online:
Advanced Computing and Communication Technologies

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 562))

Abstract

The metadata representation in the context of data privacy is one of the biggest challenges in data security. The segregation of the data attributes for secure data retrieval as well as data storage is the primary motivation for this work. The metadata-based data retrieval is performed for providing a layer of protection on the actual data set and also for efficiently searching the location of encrypted data. The paper aims to provide a technique for representing the metadata of the encrypted e-health data for a secure data retrieval process. The hierarchical representation of metadata helps in retrieving the data in an efficient way so that access to the sensitive information could be controlled. The paper proposes a novel technique for metadata design for secure data retrieval. E-health data is fragmented over multiple servers based on sensitive attribute and sensitive association. A brief overview of the data protection and data retrieval techniques with respect to the proposed metadata representation is also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://www.computerworld.com/article/2509588/data-center/world-s-data-will-grow-by-50x-in-next-decade–idc-study-predicts.html, https://www.emc.com/collateral/analyst-reports/idc-the-digital-universe-in-2020.pdf

  2. Hasan, R., Myagmar, S., Lee, A.J., Yurcik, W.: Toward a threat model for storage systems. In: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability Storage SS’05, pp. 94–102. ACM New York (2005)

    Google Scholar 

  3. Weng, L., Amsaleg, L., Morton, A., Marchand-Maillet, S.: A privacy-preserving framework for large-scale content-based information retrieval. IEEE Trans. Inf. Forensics Secur. 10(1), 152–167 (2015)

    Article  Google Scholar 

  4. Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the 2002 ACM SIGMOD International Conference on Management of data, pp. 216–227. ACM, NY (2002). http://www.ics.uci.edu/~chenli/pub/sigmod02.pdf

  5. Wang, H., Lakshmanan, L.V.: Efficient secure query evaluation over encrypted XML databases. In: Proceedings of the 32nd International Conference on Very large Data Bases. pp. 127–138. VLDB Endowment (2006). http://www.vldb.org/conf/2006/p127-wang.pdf

  6. di Vimercati, S.D.C., Erbacher, R.F., Foresti, S., Jajodia, S., Livraga, G., Samarati, P.: Encryption and fragmentation for data confidentiality in the cloud. In: Aldini, A., et.al. (eds.) Foundations of Security Analysis and Design, FOASD VII LNCS 8604, pp. 212–243. Springer International Publishing, Switzerland (2014)

    Google Scholar 

  7. di Vimercati, S.D.C., Foresti, S., Samarati, P.: Selective and fine-grained access to data in the cloud. In: Jajodia S., et al. (eds.) Secure Cloud Computing, pp. 123–148. Springer Science + Business Media, New York (2013). http://spdp.di.unimi.it/papers/dfs-aro2013.pdf

  8. Trivedi, D., Zavarsky, P., and Butakov, S.: Enhancing relational database security by metadata segregation. Procedia Comput. Sci. 94, 453–458 (2016) (Shakshuki, E. (ed.) Elsevier B.V., Amsterdam)

    Google Scholar 

  9. Jegadeeswari, S., Dinadayalan, P., Gnanambigai, N.: A Neural data security model: ensure high confidentiality and security in cloud data storage environment. In: Lloret Mauri J., et al. (eds.) International Conference on Advances in Computing, Communications and Informatics (ICACCI, Kochi, India), pp. 400–406. IEEE (2015)

    Google Scholar 

  10. De Capitani di Vimercati, S., et al.: Private data indexes for selective access to outsourced data. In: Proceedings of the 10th annual ACM workshop on Privacy in the Electronic society, ACM NY(2011)

    Google Scholar 

  11. Saha, S., Das, R., Datta, S. Neogy, S.: A cloud security framework for a data centric WSN application: In Proceedings of the 17th International Conference on Distributed Computing and Networking, pp. 39. ACM (2016)

    Google Scholar 

  12. Cassandra: http://cassandra.apache.org/

Download references

Acknowledgements

This work is supported by Information Technology Research Academy (ITRA), Government of India, ITRA-Mobile grant ITRA/15(59)/Mobile/RemoteHealth/01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sayantani Saha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Saha, S., Saha, P., Neogy, S. (2018). Hierarchical Metadata-Based Secure Data Retrieval Technique for Healthcare Application. In: Choudhary, R., Mandal, J., Bhattacharyya, D. (eds) Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol 562. Springer, Singapore. https://doi.org/10.1007/978-981-10-4603-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4603-2_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4602-5

  • Online ISBN: 978-981-10-4603-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics