Abstract
In healthcare application, a huge amount of sensitive data is generated continuously which requires an efficient mechanism to retrieve them such that sensitive information is not leaked to unauthorized users. In this paper, we introduce a data retrieval strategy in linearly scalable high-performance NoSQL database like Cassandra and present a security analysis while retrieving the stored data. E-Health data is fragmented over multiple servers based on sensitive attributes and their sensitive association. It is required to make an extra layer of protection on actual data by representing it to users as chunks by introducing metadata concept. However, data retrieval requires authentication of users and the queries put forth by the user, for which a proper costing mechanism involving both user and query is introduced in this work using linear optimization concept.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Hasan, R., Myagmar, S., Lee, A.J., Yurcik, W.: Toward a threat model for storage systems. In: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability Storage SS05, pp. 94–102. ACM, New York (2005)
Mushtaque, A.: Comparative analysis on different parameters of encryption algorithms for information security. IJCSE 2(4), 2347–2693 (2014)
Reassessing Your Security Practices in a Health IT Environment: A Guide for Small Health Care Practices
Weng, L., Amsaleg, L., Morton, A., Maillet, S.: A privacy-preserving framework for large-scale content-based information retrieval. IEEE Trans. Inf. Forensics Secur. 10(1), 152–167 (2015)
Saha, S., Neogy, S.: Case study on a smart surveillance system using WSN and IP webcam. In: IEEE Xplore International Conference on Applications and Innovations in Mobile Computing (AIMoC 2014), pp. 36–41 (2014)
Koutris, P., Upadhyaya, P., Balazinska, M., Howe, B., Suciu, D.: Query-Based Data Pricing, PODS 12, Scottsdale, Arizona, USA (2012)
Wang, H., Lakshmanan, L.V.: Efficient secure query evaluation over encrypted XML databases. In: Proceedings of the 32nd International Conference on Very Large Databases, pp. 127–138. VLDB Endowment (2006)
Segoufin, L., Vianu, V.: Views and queries: determinacy and rewriting. In: Proceedings of the Twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 49–60. ACM, New York (2005)
Saha, S., Saha, P., Neogy, S.: Hierarchical metadata-based secure data retrieval technique for healthcare application. In: Choudhary, R.K., Mandal, J.K., Bhattacharyya, D. (eds.) Advanced Computing and Communication Technologies. AISC, vol. 562, pp. 175–182. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-4603-2_17
Saha, S., Parbat, T., Neogy, S.: Designing a secure data retrieval strategy using NoSQL database. In: Krishnan, P., Radha Krishna, P., Parida, L. (eds.) ICDCIT 2017. LNCS, vol. 10109, pp. 235–238. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-50472-8_20
Chowdhury, C., Neogy, S.: Checkpointing using mobile agents for mobile computing system. Int. J. Recent Trends Eng. 1(2), 26–29 (2009)
Biswas, S., Neogy, S.: Checkpointing and recovery using node mobility among clusters in mobile ad hoc network. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) Advances in Computing and Information Technology. AISC, vol. 176, pp. 447–456. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31513-8_46
Chowdhury, C., Neogy, S.: A consistent checkpointing-recovery protocol for minimal number of nodes in mobile computing system. In: Aluru, S., Parashar, M., Badrinath, R., Prasanna, V.K. (eds.) HiPC 2007. LNCS, vol. 4873, pp. 599–611. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77220-0_54
Chowdhury, C., Neogy, S.: Securing mobile agents in MANET against attacks using trust. Int. J. Netw. Secur. Appl. (IJNSA) 3(6), 259–274 (2011)
Cassandra. http://cassandra.apache.org/
Acknowledgement
The authors like to acknowledge Department of Computer Science & Engineering, Jadavpur University and Information Technology Research Academy (ITRA), GoI, ITRA-Mobile grant ITRA/15(59)/Mobile/RemoteHealth/01.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumari, K., Saha, S., Neogy, S. (2019). Cost Based Model for Secure Health Care Data Retrieval. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_5
Download citation
DOI: https://doi.org/10.1007/978-981-13-5826-5_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5825-8
Online ISBN: 978-981-13-5826-5
eBook Packages: Computer ScienceComputer Science (R0)