Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks
- 383 Downloads
In the recent past, Internet of Things (IoT) plays a significant role in different applications such as health care, industrial sector, defense and research etc.… It provides effective framework in maintaining the security, privacy and reliability of the information in internet environment. Among various applications as mentioned health care place a major role, because security, privacy and reliability of the medical information is maintained in an effective way. Even though, IoT provides the effective protocols for maintaining the information, several intermediate attacks and intruders trying to access the health information which in turn reduce the privacy, security and reliability of the entire health care system in internet environment. As a result and to solve the issues, in this research Learning based Deep-Q-Networks has been introduced for reducing the malware attacks while managing the health information. This method examines the medical information in different layers according to the Q-learning concept which helps to minimize the intermediate attacks with less complexity. The efficiency of the system has been evaluated with the help of experimental results and discussions.
KeywordsInternet of things (IoT) Privacy Security and reliability Learning based deep-Q-networks
Compliance with Ethical Standards
Conflicts of Interest
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
All procedures performed in this study were in accordance with the ethical standards of the institutional research committee and with the 1964 Helsinki declaration and its later amendments.
Informed consent was obtained from all individual participants included in the study.
- 1.Nordrum, A., Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated. IEEE. 2016.Google Scholar
- 3.Vongsingthong, S., Smanchat, S., Internet of Things: A review of applications & technologies" (PDF). Suranaree J. Sci. Technol. 2014.Google Scholar
- 4.Kang, W. M. , Moon, S. Y, Park, J. H., An enhanced security framework for home appliances in smart home. Human-centric Comput. Inform. Sci. 7 (6). 2017. doi: https://doi.org/10.1186/s13673-017-0087-4. Retrieved 3 November 2017.
- 5.Istepanian, R., Hu, S., Philip, N., and Sungoor, A., The potential of internet of m-health things "m-IoT" for non-invasive glucose level sensing. Ann Int. Conf IEEE Eng. Med. Biol. Soc. (EMBC)., 2011. https://doi.org/10.1109/IEMBS.2011.6091302.
- 6.Feamster, N., Mitigating the Increasing Risks of an Insecure Internet of Things. Freedom to Tinker. 2017.Google Scholar
- 7.Alshehri, S., Radziszowski, S. P., and Raj, R. K., Secure access foe healthcare data in the cloud using Ciphertext-policy attribute-based encryption. Arlington: IEEE 28th Int. Conf. on Data Engineering Workshops, 2012, 143–146.Google Scholar
- 8.Mxoli, A., Gerber, M., and Phipps, N. M., Information security risk measures for cloud based personal Heath Records. London: IEEE Int. Conf. on Information Society, 2014, 187–193.Google Scholar
- 12.Sultan Alasmari; Mohd Anwar, Security & Privacy Challenges in IoT-Based Health Cloud, International Conference on Computational Science and Computational Intelligence (CSCI) in IEEE, 2016.Google Scholar
- 16.Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M., Internet of Things for Smart Cities. IEEE Internet Things J. 1(1), 2014.Google Scholar
- 17.Li, F., Xiong, P., Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things. IEEE Sensors J. 13(10), 2013.Google Scholar
- 18.Chze, P. L. R., Leong, K. S., A secure multi-hop routing for IoT communication. IEEE World Forum on Internet of Things (WF-IoT), 2014.Google Scholar
- 19.Tan, Z., Jamdagni, A., He, X., Nanda, P., and Liu, R. P., A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans. Paral. Distrib. Syst. 25(2):447–456, 2013.Google Scholar
- 21.Szegedy, Christian; Toshev, Alexander; Erhan, Dumitru, Deep neural networks for object detection. Adv. Neu. Inform. Proc. Syst., 2013.Google Scholar
- 25.Krizhevsky, A., Sutskever, I., and Hinton, G. E., Imagenet classification with deep convolutional neural networks (PDF). Adv. Neural Inf. Proces. Syst. 1:1097–1105, 2012.Google Scholar
- 26.Collobert, R., Bengio, S.. Links between Perceptrons, MLPs and SVMs. Proc. Int'l Conf. on Machine Learning (ICML), 2004.Google Scholar