Skip to main content
Log in

RETRACTED ARTICLE: HERDE-MSNB: a predictive security architecture for IoT health cloud system

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 20 June 2022

This article has been updated

Abstract

The application of IoT in the several fields is extending due to its simple and robust functionality. Especially, with the advent of the IoT-cloud based devices, IoT are established in the field that process very high amount of data. The health care system is one of the emerging applications of the IoT-Cloud. Many research works are carried out in ensuring the privacy of the patient data. The main issues in the IoT-cloud based health system remains on the security of data along with computation overheads. Predicting disease using patient data from the IoT device is another demanding aspect of health systems. In this research work, a novel Homomorphic Encryption with Random Diagonal Elliptical curve cryptography integrated with Multi-nomial smoothing Naive Bayes (HERDE-MSNB) is proposed to provide the effective security and predict the disease over patient data in the IoT Health Cloud system. The cryptic framework in the proposed architecture involves the encryption and decryption of the patient data along with key words through the HERDE algorithm. The Medicinal person deciphers the encrypted data and performs the prediction through the MSNB model. The UCI repository dataset is employed to predict the performance of the security and prediction model. From the analysis it is observed that the proposed architecture is effective in providing security and disease prediction than the existing models with less processing time, computational cost and increased accuracy. The future work may include all aspects of the dataset with robust prediction model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Change history

References

  • Abidi B, Jilbab, A, Haziti ME (2017) Wireless sensor networks in biomedical: Wireless body area networks. In: Europe and MENA Cooperation Advances in Information and Communication Technologies. Springer: Berlin/Heidelberg, Germany, pp. 321–329.

  • Ahmed TM (2016) Developing a predicted model for diabetes type 2 treatment plans by using data mining. J Theoret Appl Inf Technol 90(2):181

    Google Scholar 

  • Ambika M, Raghuraman G, SaiRamesh L, Ayyasamy A (2020) Intelligence–based decision support system for diagnosing the incidence of hypertensive type. J Intell Fuzzy Syst 38(2):1811–1825

    Article  Google Scholar 

  • Ankita S, Nisheeth S (2013) Elliptic curve cryptography: an efficient approach for encryption and decryption of a data sequence. Int J Sci Res 2(5):2013

    Google Scholar 

  • Azeez NA, Van der Vyver C (2018). Security and privacy issues in e-health cloud-based system: A comprehensive content analysis. Egypt Inf J

  • Baharon MR, Shi Q, Abdollah MF, Yassin SWMS, Idris A (2018) An improved fully homomorphic encryption scheme for cloud computing. Int J Commun Netw Inf Secur 10(3):502

    Google Scholar 

  • Bai TDP, Jerald AV, Rabara SA (2015) Elliptic curve cryptography based security framework for internet of things and cloud computing. Int J Comput Sci Technol 6:223–229

    Google Scholar 

  • Bhati M, Rani P (2015) Review of passive security measure on trusted cloud computing. Int J Sci Eng Appl Sci (IJSEAS) 1(3):551–556

    Google Scholar 

  • Bost R, Popa RA, Tu S, Goldwasser S (2015) Machine learning classification over encrypted data. NDSS 4324:4325

    Google Scholar 

  • Darwish A, Hassanien AE, Elhoseny M, Sangaiah AK, Muhammad K (2019) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Hum Comput 10:4151–4166

    Article  Google Scholar 

  • Graepel T, Lauter K, Naehrig M (2012) ML confidential: Machine learning on encrypted data. In: International Conference on Information Security and Cryptology (pp. 1–21). Springer, Berlin, Heidelberg.

  • Khedr A, Gulak G, Vaikuntanathan V (2015) SHIELD: scalable homomorphic implementation of encrypted data-classifiers. IEEE Trans Comput 65(9):2848–2858

    Article  MathSciNet  Google Scholar 

  • Liu G, Wang L, Wang Q, Zhou G, Wang Y, Jiang Q (2014) A new approach to detect congestive heart failure using shortterm heart rate variability measures. PLoS ONE 9(4):e93399

    Article  Google Scholar 

  • Liu Y, Dong B, Guo B, Yang J, Peng W (2015) Combination of cloud computing and internet of things (IOT) in medical monitoring systems. Int J Hybrid Inf Technol 8(12):367–376

    Google Scholar 

  • Manikanda Kumaran K, Chinnadurai M (2020) Cloud-based robotic system for crowd control in smart cities using hybrid intelligent generic algorithm. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01758-w

    Article  Google Scholar 

  • Miao Y, Ma J, Liu X, Liu Z, Shen L, Wei F (2018) VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peerto-Peer Netw Appl 11(2):287–297

    Article  Google Scholar 

  • Olaniyi EO, Oyedotun OK (2015) Heart diseases diagnosis using neural networks arbitration. In J Intell Syst Appl 7(12):75–82

    Google Scholar 

  • Pecarina J, Pu S, Liu J-C (2012) “SAPPHIRE: Anonymity for enhanced control and private collaboration in healthcare clouds. In: Proc. IEEE 4th Int. Conf. Cloud Comput. Technol. Sci.

  • Polat K, Güneş S, Arslan A (2008) A cascade learning system for classification of diabetes disease: generalized discriminant analysis and least square support vector machine. Expert Syst Appl 34(1):482–487

    Article  Google Scholar 

  • Prabal V, Sood SK, Kalra S (2018) Cloud-centric IoT based student healthcare monitoring framework. J Ambient Intell Humaniz Comput 9:1293–1309

    Article  Google Scholar 

  • Renuka M, Shyla J (2016) Analysis of various data mining techniques to predict diabetes mellitus. Int J Appl Eng Res 11(1):727–730

    Google Scholar 

  • Rumsfeld JS, Joynt KE, Maddox TM (2016) Big data analytics to improve cardiovascular care: promise and challenges. Nat Rev Cardiol 13(6):350

    Article  Google Scholar 

  • Sanjay S, Sood SK, Gupta SK (2018) IoT-based cloud framework to control Ebola virus outbreak. J Ambient Intell Hum Comput 9:459–476

    Article  Google Scholar 

  • Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of IoT and cloud computing. Future Gener Comput Syst 78:964–975

    Article  Google Scholar 

  • Wu DN, Gan QQ, Wang XM (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445–42453

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Vedaraj.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-04173-5

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vedaraj, M., Ezhumalai, P. RETRACTED ARTICLE: HERDE-MSNB: a predictive security architecture for IoT health cloud system. J Ambient Intell Human Comput 12, 7333–7342 (2021). https://doi.org/10.1007/s12652-020-02408-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02408-x

Keywords

Navigation