Loading

Privacy Preservation of Healthcare Data in Hybrid Cloud using a Hybrid Meta-Heuristics Based Sanitization Technique
Sridhar Reddy Vulapula1, Srinivas Malladi2
1Sridhar Reddy Vulapula, Department of CSE, KL University, Andhra Pradesh, India.
2Dr Srinivas Malladi, Department of CSE, KL University, Andhra Pradesh, India.

Manuscript received on November 20, 2019. | Revised Manuscript received on November 26, 2019. | Manuscript published on 30 November, 2019. | PP: 2882-2890 | Volume-8 Issue-4, November 2019. | Retrieval Number: C4575098319/2019©BEIESP | DOI: 10.35940/ijrte.C4575.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Over the recent years, the expansion of cloud computing services enable hospitals and institutions to transit their healthcare data to the cloud, thus it provides the worldwide data access and on-demand high quality services at a cheaper rate. Despite the benefits of healthcare cloud services, the associated privacy issues are widely concerned by individuals and governments. Privacy risks rise when outsourcing personal healthcare records to cloud due to the sensitive nature of health information and the social and legal implications for its disclosure. Over the recent years, a privacy-preserving data mining (PPDM) technique has become a critical issue for the problems. Our goal is to design a privacy-preserving outsourcing framework under the hybrid cloud model. In this work we propose a Hybrid Ant Colony Optimization and Gravitational Search Algorithm (ACOGSA) to express the problem of hiding sensitive data through transaction deletion. Thus, it reduces the side effects of the hybrid cloud. Substantive experiments will be carried to compare the performance of the designed algorithm with the state-of-the-art approaches in terms of the side effects and database similarity (integrity). Over the past to sanitize the databases used for hiding sensitive information, a few heuristic approaches have been proposed. The method used for the comparison involves GA, PSO, ACO, and Firefly framework.
Keywords: GA, PSO, ACO, and Firefly Framework.
Scope of the Article: Software  Analysis.