Simplified and Efficient Framework for Securing Medical Image Processing Over Cloud Computing
Abstract
As the utilization of imaging tools increases in healthcare domain, cloud applications are becoming a popular approach for processing medical data. In addition to being the most affordable solution, this approach offers simple and efficient mechanisms to manage clients’ data. In this regard, this concept aims at completely replacing traditional on-premises data centers and moving computations to the cloud. These advantages would inevitably accelerate the adoption of cloud-based data processing in the healthcare industry. Despite many advantages of using cloud services, outsourcing data processing to an external provider could jeopardize the duty to preserve the confidentiality of patients’ data. In fact, security and privacy issues obstruct this paradigm from achieving greater success in medical sector. In this context, there are several approaches and techniques to protect clients’ data against potentially malicious cloud providers. A survey of existing methods shows that computations on outsourcing data are either not supported, or will pose more challenges. Moreover, they have been shown to be poorly suited to digital records because they process each pixel separately. The eventual goal is to propose a simple and efficient technique for handling clients’ data safely. The proposal provides also a mechanism to ensure integrity checking of outsourced data. The novelty of our work is using K-means algorithm and watermarking method to secure cloud services. The implementation results prove that this methodology ensures security and QoS requirements.
Keywords
Image processing Cloud computing Security K-meansReferences
- 1.Mell, P., Grance, T.: The NIST definition of cloud computing. Technical report, National Institute of Standards and Technology, vol. 15, pp. 1–3 (2009)Google Scholar
- 2.Mazhar, A., Samee, U.K., Athanasios, V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)MathSciNetCrossRefGoogle Scholar
- 3.Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Inácio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113–170 (2013)CrossRefGoogle Scholar
- 4.Marwan, M., Kartit, A., Ouahmane, H.: Cloud-based medical image issues. Int. J. Appl. Eng. Res. 11, 3713–3719 (2016)Google Scholar
- 5.Petcu, D.: Portability and interoperability between clouds: challenges and case study. In: Abramowicz, W., Llorente, I.M., Surridge, M., Zisman, A., Vayssière, J. (eds.) ServiceWave 2011. LNCS, vol. 6994, pp. 62–74. Springer, Heidelberg (2011)Google Scholar
- 6.Ahuja, S.P., Maniand, S., Zambrano, J.: A survey of the state of cloud computing in healthcare. Network Commun. Technol. 1(2), 12–19 (2012)Google Scholar
- 7.Challa, R.K., Kakinada, J., Vijaya Kumari, G., Sunny, B.: Secure image processing using LWE based homomorphic encryption. In: Proceedings of the IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–6 (2015)Google Scholar
- 8.Mohanty, M., Atrey, P.K., Ooi, W.-T.: Secure cloud-based medical data visualization. In: Proceedings of the ACM Conference on Multimedia (ACMMM 2012), Japan, pp. 1105–1108 (2012)Google Scholar
- 9.Mirarab, A., Ghasemi Fard, N., Shamsi, M.: A cloud solution for medical image processing. Int. J. Eng. Res. Appl. 4(7), 74–82 (2014)Google Scholar
- 10.Gomathisankaran, M., Yuan, X., Kamongi, P.: Ensure privacy and security in the process of medical image analysis. In: Proceedings of the IEEE International Conference on Granular Computing (GrC), pp. 120–125 (2013)Google Scholar
- 11.Huang, Q., Ye, L., Yu, M., Wu, F., Liang, R.: Medical information integration based cloud computing. In: Proceedings of the IEEE International Conference on Network Computing and Information Security (NCIS), pp. 79–83 (2011). https://doi.org/10.1109/ncis.2011.24
- 12.Bednarz, T., Wang, D., Arzhaeva, Y., Szul, P., Chen, S., Khassapov, A., Budett, N., Gureyev, T., Taylor, J.: Cloud-based image analysis and processing toolbox for biomedical applications. In: Proceedings of the 8th IEEE International Conference on eScience, Chicago, pp. 8–12 (2012)Google Scholar
- 13.Todica, V., Vaida, M.F.: SOA-based medical image processing platform. In: Proceedings of the of IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), pp. 398–403 (2008). https://doi.org/10.1109/aqtr.2008.4588775
- 14.Vemula, S., Crick, C.: Hadoop image processing framework. In: Proceedings of the of IEEE International Congress on Big Data (BigData Congress), New York, pp. 506–513 (2015). https://doi.org/10.1109/bigdatacongress.2015.80
- 15.Sathish, V., Sangeetha, T.A.: Cloud-based image processing with data priority distribution mechanism. J. Comput. Appl. 06(1), 6–8 (2013)Google Scholar
- 16.Chiang, W., Lin, H., Wu, T., Chen, C.: Building a cloud service for medical image processing based on service-orient architecture. In: Proceedings of the 4th International Conference on Biomedical Engineering and Informatics (BMEI), pp. 1459–1465 (2011). https://doi.org/10.1109/bmei.2011.6098638
- 17.Moulick, H.N., Ghosh, M.: Medical image processing using a service oriented architecture and distributed environment. Am. J. Eng. Res. (AJER) 02(10), 52–62 (2013)Google Scholar
- 18.Kagadis, G., Alexakos, C., Papadimitroulas, P., Papanikolaou, N., Megalooikonomou, V., Karnabatidis, D.: Cloud computing application for brain tumor detection. European Society of Radiology, Poster C-1851, pp. 1–16 (2015)Google Scholar
- 19.Hu, N., Cheung, S.C.: Secure image filtering. In: Proceedings of the of IEEE International Conference on Image Processing (ICIP 2006), pp. 1553–1556 (2006)Google Scholar
- 20.Avidan, S., Butman M.: Blind vision. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) Computer Vision – ECCV 2006. Lecture Notes in Computer Science, vol. 3953, pp. 1–13. Springer, Heidelberg (2006). https://doi.org/10.1007/11744078_1
- 21.Thodi, D.M., Rodriguez, J.J.: Prediction-error based reversible watermarking. In: Proceedings of the International Conference on Image Processing (ICIP 2004), vol. 3, pp. 1549–1552 (2004)Google Scholar
- 22.Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721–730 (2007)MathSciNetCrossRefGoogle Scholar
- 23.Khan, A., Siddiqa, A., Munib, S., Malik, S.A.: A recent survey of reversible watermarking techniques. Inform. Sci. 279, 251–272 (2014)CrossRefGoogle Scholar
- 24.Gan, G., Ma, C., Wu, J.: Data Clustering: Theory, Algorithms and Applications. Society for Industrial and Applied Mathematics. SIAM, Philadelphia (2007)CrossRefMATHGoogle Scholar