Advertisement

Simplified and Efficient Framework for Securing Medical Image Processing Over Cloud Computing

  • Mbarek Marwan
  • Ali Kartit
  • Hassan Ouahmane
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 37)

Abstract

As the utilization of imaging tools increases in healthcare domain, cloud applications are becoming a popular approach for processing medical data. In addition to being the most affordable solution, this approach offers simple and efficient mechanisms to manage clients’ data. In this regard, this concept aims at completely replacing traditional on-premises data centers and moving computations to the cloud. These advantages would inevitably accelerate the adoption of cloud-based data processing in the healthcare industry. Despite many advantages of using cloud services, outsourcing data processing to an external provider could jeopardize the duty to preserve the confidentiality of patients’ data. In fact, security and privacy issues obstruct this paradigm from achieving greater success in medical sector. In this context, there are several approaches and techniques to protect clients’ data against potentially malicious cloud providers. A survey of existing methods shows that computations on outsourcing data are either not supported, or will pose more challenges. Moreover, they have been shown to be poorly suited to digital records because they process each pixel separately. The eventual goal is to propose a simple and efficient technique for handling clients’ data safely. The proposal provides also a mechanism to ensure integrity checking of outsourced data. The novelty of our work is using K-means algorithm and watermarking method to secure cloud services. The implementation results prove that this methodology ensures security and QoS requirements.

Keywords

Image processing Cloud computing Security K-means 

References

  1. 1.
    Mell, P., Grance, T.: The NIST definition of cloud computing. Technical report, National Institute of Standards and Technology, vol. 15, pp. 1–3 (2009)Google Scholar
  2. 2.
    Mazhar, A., Samee, U.K., Athanasios, V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Inácio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113–170 (2013)CrossRefGoogle Scholar
  4. 4.
    Marwan, M., Kartit, A., Ouahmane, H.: Cloud-based medical image issues. Int. J. Appl. Eng. Res. 11, 3713–3719 (2016)Google Scholar
  5. 5.
    Petcu, D.: Portability and interoperability between clouds: challenges and case study. In: Abramowicz, W., Llorente, I.M., Surridge, M., Zisman, A., Vayssière, J. (eds.) ServiceWave 2011. LNCS, vol. 6994, pp. 62–74. Springer, Heidelberg (2011)Google Scholar
  6. 6.
    Ahuja, S.P., Maniand, S., Zambrano, J.: A survey of the state of cloud computing in healthcare. Network Commun. Technol. 1(2), 12–19 (2012)Google Scholar
  7. 7.
    Challa, R.K., Kakinada, J., Vijaya Kumari, G., Sunny, B.: Secure image processing using LWE based homomorphic encryption. In: Proceedings of the IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–6 (2015)Google Scholar
  8. 8.
    Mohanty, M., Atrey, P.K., Ooi, W.-T.: Secure cloud-based medical data visualization. In: Proceedings of the ACM Conference on Multimedia (ACMMM 2012), Japan, pp. 1105–1108 (2012)Google Scholar
  9. 9.
    Mirarab, A., Ghasemi Fard, N., Shamsi, M.: A cloud solution for medical image processing. Int. J. Eng. Res. Appl. 4(7), 74–82 (2014)Google Scholar
  10. 10.
    Gomathisankaran, M., Yuan, X., Kamongi, P.: Ensure privacy and security in the process of medical image analysis. In: Proceedings of the IEEE International Conference on Granular Computing (GrC), pp. 120–125 (2013)Google Scholar
  11. 11.
    Huang, Q., Ye, L., Yu, M., Wu, F., Liang, R.: Medical information integration based cloud computing. In: Proceedings of the IEEE International Conference on Network Computing and Information Security (NCIS), pp. 79–83 (2011).  https://doi.org/10.1109/ncis.2011.24
  12. 12.
    Bednarz, T., Wang, D., Arzhaeva, Y., Szul, P., Chen, S., Khassapov, A., Budett, N., Gureyev, T., Taylor, J.: Cloud-based image analysis and processing toolbox for biomedical applications. In: Proceedings of the 8th IEEE International Conference on eScience, Chicago, pp. 8–12 (2012)Google Scholar
  13. 13.
    Todica, V., Vaida, M.F.: SOA-based medical image processing platform. In: Proceedings of the of IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), pp. 398–403 (2008).  https://doi.org/10.1109/aqtr.2008.4588775
  14. 14.
    Vemula, S., Crick, C.: Hadoop image processing framework. In: Proceedings of the of IEEE International Congress on Big Data (BigData Congress), New York, pp. 506–513 (2015).  https://doi.org/10.1109/bigdatacongress.2015.80
  15. 15.
    Sathish, V., Sangeetha, T.A.: Cloud-based image processing with data priority distribution mechanism. J. Comput. Appl. 06(1), 6–8 (2013)Google Scholar
  16. 16.
    Chiang, W., Lin, H., Wu, T., Chen, C.: Building a cloud service for medical image processing based on service-orient architecture. In: Proceedings of the 4th International Conference on Biomedical Engineering and Informatics (BMEI), pp. 1459–1465 (2011).  https://doi.org/10.1109/bmei.2011.6098638
  17. 17.
    Moulick, H.N., Ghosh, M.: Medical image processing using a service oriented architecture and distributed environment. Am. J. Eng. Res. (AJER) 02(10), 52–62 (2013)Google Scholar
  18. 18.
    Kagadis, G., Alexakos, C., Papadimitroulas, P., Papanikolaou, N., Megalooikonomou, V., Karnabatidis, D.: Cloud computing application for brain tumor detection. European Society of Radiology, Poster C-1851, pp. 1–16 (2015)Google Scholar
  19. 19.
    Hu, N., Cheung, S.C.: Secure image filtering. In: Proceedings of the of IEEE International Conference on Image Processing (ICIP 2006), pp. 1553–1556 (2006)Google Scholar
  20. 20.
    Avidan, S., Butman M.: Blind vision. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) Computer Vision – ECCV 2006. Lecture Notes in Computer Science, vol. 3953, pp. 1–13. Springer, Heidelberg (2006).  https://doi.org/10.1007/11744078_1
  21. 21.
    Thodi, D.M., Rodriguez, J.J.: Prediction-error based reversible watermarking. In: Proceedings of the International Conference on Image Processing (ICIP 2004), vol. 3, pp. 1549–1552 (2004)Google Scholar
  22. 22.
    Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721–730 (2007)MathSciNetCrossRefGoogle Scholar
  23. 23.
    Khan, A., Siddiqa, A., Munib, S., Malik, S.A.: A recent survey of reversible watermarking techniques. Inform. Sci. 279, 251–272 (2014)CrossRefGoogle Scholar
  24. 24.
    Gan, G., Ma, C., Wu, J.: Data Clustering: Theory, Algorithms and Applications. Society for Industrial and Applied Mathematics. SIAM, Philadelphia (2007)CrossRefzbMATHGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.LTI Laboratory, ENSAChouaïb Doukkali UniversityEl JadidaMorocco

Personalised recommendations