Abstract
The metadata representation in the context of data privacy is one of the biggest challenges in data security. The segregation of the data attributes for secure data retrieval as well as data storage is the primary motivation for this work. The metadata-based data retrieval is performed for providing a layer of protection on the actual data set and also for efficiently searching the location of encrypted data. The paper aims to provide a technique for representing the metadata of the encrypted e-health data for a secure data retrieval process. The hierarchical representation of metadata helps in retrieving the data in an efficient way so that access to the sensitive information could be controlled. The paper proposes a novel technique for metadata design for secure data retrieval. E-health data is fragmented over multiple servers based on sensitive attribute and sensitive association. A brief overview of the data protection and data retrieval techniques with respect to the proposed metadata representation is also presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
http://www.computerworld.com/article/2509588/data-center/world-s-data-will-grow-by-50x-in-next-decade–idc-study-predicts.html, https://www.emc.com/collateral/analyst-reports/idc-the-digital-universe-in-2020.pdf
Hasan, R., Myagmar, S., Lee, A.J., Yurcik, W.: Toward a threat model for storage systems. In: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability Storage SS’05, pp. 94–102. ACM New York (2005)
Weng, L., Amsaleg, L., Morton, A., Marchand-Maillet, S.: A privacy-preserving framework for large-scale content-based information retrieval. IEEE Trans. Inf. Forensics Secur. 10(1), 152–167 (2015)
Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the 2002 ACM SIGMOD International Conference on Management of data, pp. 216–227. ACM, NY (2002). http://www.ics.uci.edu/~chenli/pub/sigmod02.pdf
Wang, H., Lakshmanan, L.V.: Efficient secure query evaluation over encrypted XML databases. In: Proceedings of the 32nd International Conference on Very large Data Bases. pp. 127–138. VLDB Endowment (2006). http://www.vldb.org/conf/2006/p127-wang.pdf
di Vimercati, S.D.C., Erbacher, R.F., Foresti, S., Jajodia, S., Livraga, G., Samarati, P.: Encryption and fragmentation for data confidentiality in the cloud. In: Aldini, A., et.al. (eds.) Foundations of Security Analysis and Design, FOASD VII LNCS 8604, pp. 212–243. Springer International Publishing, Switzerland (2014)
di Vimercati, S.D.C., Foresti, S., Samarati, P.: Selective and fine-grained access to data in the cloud. In: Jajodia S., et al. (eds.) Secure Cloud Computing, pp. 123–148. Springer Science + Business Media, New York (2013). http://spdp.di.unimi.it/papers/dfs-aro2013.pdf
Trivedi, D., Zavarsky, P., and Butakov, S.: Enhancing relational database security by metadata segregation. Procedia Comput. Sci. 94, 453–458 (2016) (Shakshuki, E. (ed.) Elsevier B.V., Amsterdam)
Jegadeeswari, S., Dinadayalan, P., Gnanambigai, N.: A Neural data security model: ensure high confidentiality and security in cloud data storage environment. In: Lloret Mauri J., et al. (eds.) International Conference on Advances in Computing, Communications and Informatics (ICACCI, Kochi, India), pp. 400–406. IEEE (2015)
De Capitani di Vimercati, S., et al.: Private data indexes for selective access to outsourced data. In: Proceedings of the 10th annual ACM workshop on Privacy in the Electronic society, ACM NY(2011)
Saha, S., Das, R., Datta, S. Neogy, S.: A cloud security framework for a data centric WSN application: In Proceedings of the 17th International Conference on Distributed Computing and Networking, pp. 39. ACM (2016)
Cassandra: http://cassandra.apache.org/
Acknowledgements
This work is supported by Information Technology Research Academy (ITRA), Government of India, ITRA-Mobile grant ITRA/15(59)/Mobile/RemoteHealth/01.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saha, S., Saha, P., Neogy, S. (2018). Hierarchical Metadata-Based Secure Data Retrieval Technique for Healthcare Application. In: Choudhary, R., Mandal, J., Bhattacharyya, D. (eds) Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol 562. Springer, Singapore. https://doi.org/10.1007/978-981-10-4603-2_17
Download citation
DOI: https://doi.org/10.1007/978-981-10-4603-2_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4602-5
Online ISBN: 978-981-10-4603-2
eBook Packages: EngineeringEngineering (R0)