Cost Based Model for Secure Health Care Data Retrieval

  • Kritika Kumari
  • Sayantani Saha
  • Sarmistha NeogyEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 969)


In healthcare application, a huge amount of sensitive data is generated continuously which requires an efficient mechanism to retrieve them such that sensitive information is not leaked to unauthorized users. In this paper, we introduce a data retrieval strategy in linearly scalable high-performance NoSQL database like Cassandra and present a security analysis while retrieving the stored data. E-Health data is fragmented over multiple servers based on sensitive attributes and their sensitive association. It is required to make an extra layer of protection on actual data by representing it to users as chunks by introducing metadata concept. However, data retrieval requires authentication of users and the queries put forth by the user, for which a proper costing mechanism involving both user and query is introduced in this work using linear optimization concept.


Sensitive data NoSQL database Metadata Linear optimization 



The authors like to acknowledge Department of Computer Science & Engineering, Jadavpur University and Information Technology Research Academy (ITRA), GoI, ITRA-Mobile grant ITRA/15(59)/Mobile/RemoteHealth/01.


  1. 1.
    Hasan, R., Myagmar, S., Lee, A.J., Yurcik, W.: Toward a threat model for storage systems. In: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability Storage SS05, pp. 94–102. ACM, New York (2005)Google Scholar
  2. 2.
    Mushtaque, A.: Comparative analysis on different parameters of encryption algorithms for information security. IJCSE 2(4), 2347–2693 (2014)Google Scholar
  3. 3.
    Reassessing Your Security Practices in a Health IT Environment: A Guide for Small Health Care PracticesGoogle Scholar
  4. 4.
    Weng, L., Amsaleg, L., Morton, A., Maillet, S.: A privacy-preserving framework for large-scale content-based information retrieval. IEEE Trans. Inf. Forensics Secur. 10(1), 152–167 (2015)CrossRefGoogle Scholar
  5. 5.
    Saha, S., Neogy, S.: Case study on a smart surveillance system using WSN and IP webcam. In: IEEE Xplore International Conference on Applications and Innovations in Mobile Computing (AIMoC 2014), pp. 36–41 (2014)Google Scholar
  6. 6.
    Koutris, P., Upadhyaya, P., Balazinska, M., Howe, B., Suciu, D.: Query-Based Data Pricing, PODS 12, Scottsdale, Arizona, USA (2012)Google Scholar
  7. 7.
    Wang, H., Lakshmanan, L.V.: Efficient secure query evaluation over encrypted XML databases. In: Proceedings of the 32nd International Conference on Very Large Databases, pp. 127–138. VLDB Endowment (2006)Google Scholar
  8. 8.
    Segoufin, L., Vianu, V.: Views and queries: determinacy and rewriting. In: Proceedings of the Twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 49–60. ACM, New York (2005)Google Scholar
  9. 9.
    Saha, S., Saha, P., Neogy, S.: Hierarchical metadata-based secure data retrieval technique for healthcare application. In: Choudhary, R.K., Mandal, J.K., Bhattacharyya, D. (eds.) Advanced Computing and Communication Technologies. AISC, vol. 562, pp. 175–182. Springer, Singapore (2018). Scholar
  10. 10.
    Saha, S., Parbat, T., Neogy, S.: Designing a secure data retrieval strategy using NoSQL database. In: Krishnan, P., Radha Krishna, P., Parida, L. (eds.) ICDCIT 2017. LNCS, vol. 10109, pp. 235–238. Springer, Cham (2017). Scholar
  11. 11.
    Chowdhury, C., Neogy, S.: Checkpointing using mobile agents for mobile computing system. Int. J. Recent Trends Eng. 1(2), 26–29 (2009)Google Scholar
  12. 12.
    Biswas, S., Neogy, S.: Checkpointing and recovery using node mobility among clusters in mobile ad hoc network. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) Advances in Computing and Information Technology. AISC, vol. 176, pp. 447–456. Springer, Heidelberg (2012). Scholar
  13. 13.
    Chowdhury, C., Neogy, S.: A consistent checkpointing-recovery protocol for minimal number of nodes in mobile computing system. In: Aluru, S., Parashar, M., Badrinath, R., Prasanna, V.K. (eds.) HiPC 2007. LNCS, vol. 4873, pp. 599–611. Springer, Heidelberg (2007). Scholar
  14. 14.
    Chowdhury, C., Neogy, S.: Securing mobile agents in MANET against attacks using trust. Int. J. Netw. Secur. Appl. (IJNSA) 3(6), 259–274 (2011)Google Scholar
  15. 15.

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Kritika Kumari
    • 1
  • Sayantani Saha
    • 2
  • Sarmistha Neogy
    • 1
    Email author
  1. 1.Department of Computer Science and EngineeringJadavpur UniversityKolkataIndia
  2. 2.Department of Computer Science and EngineeringMaulana Abul Kalam Azad University of TechnologyKolkataIndia

Personalised recommendations