A Novel Scheme for Securing Medical Data by using Hybrid Privacy Preserving Mechanism in Healthcare Application

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-37 Number-3
Year of Publication : 2016
Authors : M.Rameshkumar, Dr. V.Lakshmiprabha


M.Rameshkumar, Dr. V.Lakshmiprabha "A Novel Scheme for Securing Medical Data by using Hybrid Privacy Preserving Mechanism in Healthcare Application". International Journal of Computer Trends and Technology (IJCTT) V37(3):110-116, July 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Data mining techniques help clinician make proper decisions in health care applications. The benefits of clinical decision support system include not only improving diagnosis of illness accuracy but also reducing identification time. Specifically, with massive amounts of clinical data generated every day, decision tree algorithm can be utilized to excavate valuable data to improve clinical decision support system. In this paper a hybrid algorithm is proposed which integrates both the homomorphic encryption and navie bayes for storing the data in database safe manner. In order to retrieve the data safely and classify the abnormal and normal data fuzzy based system is employed here.

[1] A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, “Privacy preserving mining of association rules,” Information Systems, vol. 29, no. 4, pp. 343–364, 2004.
[2] Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale,” Data Mining Approach in Security Information and Event Management”
[3] M. S. Chen and J. H. Philip, “Data Mining: An Overview from a Database Perspective,” IEEE Trans on knowledge and data engineering, vol. 8, no. 6, pp. 1-1, Dec 1996. [4] S. Yuan and C. Zou, “The Security Operations Center Based on Correlation Analysis.”
[5] Ximeng Liu, Rongxing Lu, Jianfeng Ma, Le Chen,” Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification” ieee journal of biomedical and health informatics, december 2014.
[6] Manish Kumar, Dr. M. Hanumanthapaa, “Intrusion Detection System using Stream Data Mining and Drift Detection Method”,4th lCCCNT - 2013 July 4-6,2013, Tiruchengode,India.
[7] R. Heady, G. Luger, A. Maccabe, and M. Servilla, "The architecture of a network level intrusion detection system", Technical report, Computer Science Department, University of New Mexico, August 1990
[8] Jaideep Vaidya, Basit Shafiq, Wei Fan, Danish Mehmood, and David Lorenzi,”A Random Decision Tree Framework for Privacy Preserving Data Mining”, IEEE Transactions On Dependable And Secure Computing, Vol. 11, No. 5, September/October 2014
[9] J. Vaidya, C. Clifton, and M. Zhu, “Privacy-Preserving Data Mining”, Advances in Information Security first ed., vol. 19, Springer-Verlag, 2005.
[10] W. Fan, H. Wang, P.S. Yu, and S. Ma, “Is Random Model Better?On Its Accuracy and Efficiency,” Proc. Third IEEE Int’l Conf. Data Mining (ICDM ’03), pp. 51-58, 2003
[11] G. Jagannathan and R.Wright, “Privacy-preserving distributed k-means clustering over Vertically partitioned data”,In 11th KDD, pages 593– 599, 2005.
[12] W. Du and Z. Zhan, “Building Decision Tree Classifier on Private Data,” Proc. IEEE Int’l Conf. Data Mining Workshop on Privacy, Security,and Data Mining, pp. 1-8, Dec. 2002.
[13] J. Vaidya, C. Clifton, M. Kantarcioglu, and A.S. Patterson,“Privacy-Preserving Decision Trees over Vertically Partitioned Data,” ACM Trans. Knowledge Discovery from Data, vol. 2, no. 3,pp. 1-27, 2008.
[14] M. Kantarcioglu and C. Clifton, “Privacy-Preserving Distributed Mining of Association Rules on Vertically Partitioned Data,” IEEE Trans. Knowledge and Data Eng., vol. 16, no. 9, pp. 1026-1037,Sept. 2004.
[15] G. Jagannathan and R.N. Wright, “Privacy-Preserving Distributed Distributed Mining of Association Rules over Horizonatlly Partitioned Data,” Proc. ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining,pp. 593-599, Aug. 2005.
[16] H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, “On the Privacy Preserving Properties of Random Data Perturbation Techniques,” Proc. Third IEEE Int’l Conf. Data Mining (ICDM ’03),Nov. 2003.
[17] J. Souza, “Feature Selection with a General Hybrid Algorithm,”PhD dissertation, Univ. of Ottawa, 2004.
[18] L. Yu and H. Liu, “Efficient Feature Selection via Analysis of Relevance and Redundancy,” J. Machine Learning Research, vol. 10,no. 5, pp. 1205-1224, 2004.
[19] Sha, X. Qiu, and A. Zhou, “Feature Selection Based on a New Dependency Measure,” Proc. Fifth Int’l Conf. Fuzzy Systems and Knowledge Discovery, vol. 1, pp. 266-270, 2008.
[20] M. Dash and H. Liu, “Consistency-Based Search in Feature Selection,” Artificial Intelligence, vol. 151, nos. 1/2, pp. 155-176, 2003.
[21] Moh'd Fawzi Al-Hunaity, Jawdat Alshaer, Osama Dorgham, Hussam Farr ,“Security Model for Communication and Exchanging Data in Mobile Cloud Computing”, IJCTT - Volume 30 - No 3 December 2015.

encryption, Privacy preserving technique, Navie Bayesian, Fuzzy logic.