Abstract
In recent times, providing privacy to the medical dataset has been the biggest issue in medical applications. Since, in hospitals, the patient's data are stored in files, the files must be secured properly. Thus, different machine learning models were developed to overcome data privacy issues. But, those models faced some problems in providing privacy to medical data. Therefore, a novel model named Honey pot-based Modular Neural System (HbMNS) was designed in this paper. Here, the performance of the proposed design is validated with disease classification. Also, the perturbation function and the verification module are incorporated into the designed HbMNS model to provide data privacy. The presented model is implemented in a python environment. Moreover, the system outcomes are estimated before and after fixing the perturbation function. A DoS attack is launched in the system to validate the method. At last, a comparative assessment is made between executed models with other models. From the comparison, it is verified that the presented model achieved better outcomes than others.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Data perturbation is commonly used and approved by the Privacy Data Mining technique, which implicitly requires data miners to have single-level trust [1, 2]. In addition, before the data sharing process, the individual authenticated procedure has been performed [3, 4]. In a multilayer trust environment, data miners with a wide trust level can access fewer perturbed copies [5, 6]. Moreover, at the lower trust phase, these less disrupted copies are inaccessible to data miners [7]. Also, in some cases, data miners with a wide trust range might have access to alter copies at multiple trust levels [8, 9]. Additionally, data miners with varying levels of trust may collaborate to exchange perturbed documents [10, 11]. With the growing demand for privacy protection problems, the Machine Learning (ML) based privacy-preserving model has garnered considerable interest from academics and industry [12, 13]. But, the majority of existing approaches have practical limitations [14]. The fundamentals of securing medical cloud data are described in Fig. 1.
In addition, most cryptographic techniques are provably secure, which imposes significant computational and transmission overhead [15, 16]. The trustworthiness of the relatively effective privacy-preserving approaches is being contested due to their inability to be proven secure [17]. In recent years, neural processes have been widely applied in various real-world contexts [18, 19]. The Healthcare system is the foundation for health-associated decision-making and comprises four critical functions [20]: data compilation, creation, synthesis, and analysis and usage [21, 22]. The Healthcare monitoring sector has collected information from the clouds sensed by IoT gadgets [23, 24]. Moreover, securing the cloud data is more important to protect the data against malicious events [25]. In addition, the privacy score of the designed model has been analyzed by launching malicious activities in the developed, designed model [26, 27]. While launching the attack, if the confidential range of the channel has remained in a constant wide range, then it’s sufficient for protecting the cloud data [28, 29]. Besides, if the privacy range has been decreased when the attack is in the transmit layer, then there is possible to get an attack [30, 31]. A decent ML scheme frequently requires data from numerous sources [32]. However, data resources often reticently distribute their data because it contains users' personal information. As a result, determining the training model for private info is significantly difficult. Several works have been implemented, such as fuzzy neural systems [33], Apache systems [34], etc., to end these issues. But, the appropriate results are not found. So, an optimized ML system has been planned to maintain cloud data privacy.
The Honey Pot-based Modular Neural System is a proposed solution to preserve privacy in medical data. The system is designed to protect sensitive medical data from unauthorized access or disclosure while allowing for the effective use of the data for research or other purposes. The system is based on a modular neural network architecture that uses honeypots to detect and deter unauthorized access attempts. The basic idea behind the system is to create a virtual environment that mimics the real medical data system but with fake data designed to attract hackers or other unauthorized users. These fake data sets are referred to as "honey pots." When an unauthorized user attempts to access the honey pot, the modular neural network is triggered, and a series of actions are initiated to detect and deter the intrusion attempt. The modular neural network consists of multiple modules, each performing a specific function. These modules include data acquisition, feature extraction, preprocessing, and classification. The data acquisition module collects medical data from various sources, such as electronic medical records or wearable devices. The feature extraction module identifies relevant features in the data that can be used to identify patterns or anomalies. The data preprocessing module cleans and normalizes the data to prepare it for analysis. The data classification module uses machine learning algorithms to classify the data and identify potential intrusions. In addition to the modular neural network, the system includes several other security features, such as access controls, encryption, and firewalls. These features protect real medical data from unauthorized access or disclosure. Overall, the Honey Pot-based Modular Neural System represents a promising approach to preserving privacy in medical data. The system can effectively detect and deter unauthorised access attempts by creating a virtual environment that mimics the real data system but with fake data designed to attract intruders. The modular neural network architecture and other security features provide additional layers of protection to ensure that sensitive medical data remains private and secure.
2 Related Works
A few recent associated works are described as follows:
Securing medical data in digital records is crucial for smart applications. So, Aqsa Mohiyuddin et al. [33] have designed a fuzzy neural system for the IoT sensed data to separate the normal and disease data from the sensed information. The separated data is stored separately in the cloud environment. The authentication conditions must be satisfied if anybody needs to retrieve the data. However, it has required more resources to execute.
The data stored in the cloud is unstructured, so maintaining privacy is complicated. Hence, the Apache system is utilized by Rashid et al. [34] for the real-time application to secure the stored data. Moreover, it has afforded the finest confidential range but needs more resources to run the process. In addition, the ML approaches are incorporated to identify the disease types and store the data based on disease types.
Gadekallu et al. [35] have designed a malicious forecasting system based on the block chain strategy for medical cloud data. The main purpose of this model is to predict the tampering activities in the stored data. Hence, the designed Blockchain model is tested with e-health applications and has recorded the best outcome. However, if the data size has been increased, it needs more time to execute, and the confidentiality score has been minimized.
Offering a better communication range towards the model is a big challenge. So, Babar et al. [36] have introduced the topology system incorporating communication parameters. Also, securing the cloud data demand-side approach has been employed and tested in the grid environment. Moreover, this model includes an agency system, which predicts the authentication process. But designing this system is very complex.
Cloud data is vulnerable to get an attack, so Golec et al. [37] have introduced a lightweight-based privacy design for the cloud environment to hide the stored data from third parties. In addition, based on the dataset, some modifications were required in the lightweight protocol. This model has provided high privacy for cloud data. But designing this approach has required more resources.
Masud et al. [38] introduced a low-weighted and physically secure mutual validation and protection key organization protocol that utilizes physical unclonable functions (PUFs) to ensure the system validates the user and sensor link before validating a session key. The proposed protocol provides all the required protection properties. And also utilizes low sources to manage and is secured from physical attacks. Hence it is more suitable for IoT-based medical system applications. Yet, it is dependent on the internet.
Nowadays, computer-based models like natural language and texture processing are applied to investigate sentimental assessment to detect and extract emotion. So, Alowibdi et al. [39] conducted a sentimental evaluation using a high-dimensional Twitter database of English tweets based on ten emotional themes. Experimental results show that COVID-19 has spread happiness and hope, fear, gratitude and mixed emotions among human beings for various reasons. However, the dataset consists of biased feelings.
In order to detect and recognize the COVID-19 case, Rahman et al. [40] developed a deep neural model. This research also studies federated learning in COVID-19 cases where edge learning can compute private datasets. Point-of-care ways can be combined with deep neural model-based RT-PCR lab examination outcomes to compare the multi-modality of COVID-19 identification and give more dimensions and diagnosis. This method provides good results. Yet, it needs continuous updating to increase accuracy.
Depending on deep learning, Sedik et al. [41] proposed a convolutional neural network (CNN) and convolutional long and short-term memory (ConLSTM). Two different types of databases are considered: CTges and X-ray images. This dataset consists of normal and COVID-19. Also, pneumonia and COVID-19 photos are categorized to validate the process. This method attained maximum accuracy and f-measure values for some cases. But, it is only accurate for some cases.
The world has continuously changed for the past two decades. The rapid evolution of technology is getting more issues. In order to tackle these problems, the united nation declared sustainable development goals (SDGs). It intended to stop hunger and poverty, AIDS and gender discrimination. So, SDGs should be investigated. Hence, Chopra et al. [42] studied about 17 SDGs in India’s 29 states. This research predicts a few countries like China, Germany, Japan, India, etc. Yet, many more countries are not considered.
Pashchenko, [43] investigates the transformation of 26 project teams from leading IT corporations to high-tech companies with strong internal practices like amazon, exness, VTB, BSC group, etc. Researchers estimate the outcomes of rapid adaption to transformations, work progress and predict for 2021. The main motive of this research work is to understand the new process in software development, hiring experts and organizing teams related to high-tech companies' refusal. Yet there is, technical issues occur.
Zhou et al. [44] proposed an effective technique called the filtering method for the COVID-19 scenario and identified the DDoS attack. This research proposed a statistical method, such as packet value and entropy changes for detection of DDoS attack traffic which is implemented in Omnet + + and validated in various cases. And this proposed method effectively detects the DDoS attack traffic accurately from the flash crowd. However, the cost is high, and the design is complex.
In recent days, IoT has played a major role in every activity. It can be utilized in households to wireless networks. Anyhow, there are some limitations like security and shortcoming issues. So, Tewari et al. [45] discussed the problems in the ultra-low weight method because of its sensitivity to passive secret disclosure attacks and proposed a novel technique to tackle the shortcomings issues. The proposed model utilizes timestamps with the bitwise operation to protect from de-synchronisation and disclosure. The performance analysis is carried out to validate the proposed model. But, there is limited processing power.
Bulla et al. [46] proposed multiple agent-dependent datasets gathered, and aggregated method is presented to monitor fog computing architecture. The dataset collection method considers an integrated push–pull algorithm which enhances the data while changes in the new dataset are compared with the old dataset. In order to decrease communication overhead (CH) among cloud and fog nodes, a tree-dependent data aggregation method is designed. The developed model effectively improves the data coherency with lower CH than others. Yet, there is a high resource required.
With the rapid advancement of technology, IoT has become a significant part of people. There are so many security issues with novel techniques that make the backbone of the IoTs. A few effective security methods have been designed. The challenges are increasing, and the solutions have been improving. Adat et al. [47] investigated the history, background, IoT statistics, and IoT framework safety-based assessment. This paper discusses various research papers' techniques, advantages, drawbacks, and future scope.
Zhang et al. [48] proposed a secured de-centralized spatial crowdsourcing method for the 6G-based network in the box called DSC-NIB. The base station (BS) and sensor nodes can collect and transfer data on the blockchain by NIB without based upon the other party using the proposed DSC-NIB. The BS transmits encrypted location method metrics set for negotiating session keys and group keys with sensor nodes whose location satisfies the location method when validating the safety of the sensor node’s location. The novel technique enhances the performance by about 30 to 50% compared to others. But, there is complexity in designing.
The key contributions of the work are described as follows:
-
The IoT-based medical dataset (Disease symptom data) is initially gathered and imported into the python system.
-
Consequently, a novel HbMNS has been designed with suitable parameters to secure the stored data.
-
Initially, the preprocessing functions were activated to filter the noise from the trained database
-
Moreover, the authenticated module has been created to verify the original user.
-
The system's robustness is analyzed by launching the attack in the data transit layer.
-
Subsequently, the parameters are validated regarding the accuracy, Sensitivity, precision score, F-measure, Error, and run time.
3 System Model and Problem Statement
Cloud data privacy management is the hottest topic in all fields. Moreover, securing the medical data is crucial to preventing misunderstanding of the diagnosis report. So, the framework has been introduced for the cloud application to maintain the privacy of IoT-sensed data. But in many cases, securing the data processor has failed because of the attack vulnerabilities and harmfulness. These issues have motivated this research to implement a medical cloud data privacy model.
The system model and the problem statement are illustrated in Fig. 2. In the present model, the prediction and classification of diseases are incorrect due to attacks. Also, no continuous monitoring or verification process is available, making the system inaccurate. Hence, a novel HbMNS model is developed by integrating two effective model principles to secure the medical data and the verification process. The IoT-based medical database is taken from the standard website to validate the proposed model and is fed into the developed model's input phase. The dataset is preprocessed in the hidden layer in the proposed model to neglect the unwanted data. Then, the meaningful features are extracted and classified as a disease and no disease in the feature extraction module. And to check the security of the data, the attack is launched in the designed model. The proposed model efficiently detects the malicious and neglects it from the data. Thus, the presented model effectively provides disease classification and data privacy.
4 Proposed HbMNS for Securing Medical Data
The present research article has plans to implement a novel Honeypot-based Modular Neural System (HbMNS) introduced to secure the medical data stored in the cloud environment. Initially, the medical data was taken and trained to the system then a novel HbMNS was designed to secure the trained data. Moreover, the robustness of the developed model is analyzed by launching the attack in the cloud data transaction layer. Finally, the key metrics are calculated and compared with other models. The proposed architecture is described in Fig. 3.
The presented HbMNS model is a hybrid technique that merges two methods: the Honeypot Optimization algorithm [49] and the modular neural network. Moreover, the perturbation function is incorporated into the designed model to provide continuous monitoring. Initially, the collected dataset is trained and preprocessed to remove the noise features. The meaningful features are extracted by feature extraction, and diseases are classified in the classification layer. Then, a DoS attack is launched in the system to validate the system outcomes. At last, the medical data are secured and monitored continuously with a perturbation function. Thus, the system provides privacy to medical data and protects the data from attacks.
4.1 Layers of Designed HbMNS
In the designed HbMNS model, there are five different layers. The 1st layer is the input surface, where the collected dataset gets imported and initialized in the system. The secondary layer is hidden. Here the dataset is preprocessed to remove the noise features from the dataset.
The ternary layer is the classification layer; here, the present disease features in the dataset get extracted, and the diseases are classified according to symptoms. The fourth layer is the optimization layer, and here the perturbation function is incorporated to provide data privacy and continuous monitoring through the verification process. The final frame is the output layer. Here the outcomes of the designed model are estimated.
4.1.1 Preprocessing Phase
To design the proposed HbMNS, an input dataset containing parameters like diseases, symptoms, and severity is imported into the system. To initiate the process, the imported dataset must be initialized. The Initialization of the imported dataset is done based on a modular neural network (MNN) [50]. The dataset is initialized as in Eq. (1).
where, \(D\) is the input medical dataset, \(\alpha\) and \(\beta\) are the dataset parameters, \(\zeta\) is the features present in the dataset and \(z_{n}\) is all data in the dataset. After initialization, the next step is preprocessing. Preprocessing removes the noise features from the input dataset. The preprocessing equation of the dataset is expressed in Eq. (2).
where, \(\eta \nu\) indicates the noise features in the dataset and \(\rho\) denotes preprocessing variable.
4.1.2 Feature Extraction
Feature extraction is done to extract meaningful and meaningless features separately from the preprocessed dataset. Initially, the present features are tracked. The present features contain both meaningful and meaningless features. Here, the feature extraction is done based on Honeypot optimization. The feature tracking equation is expressed in Eq. (3).
where, \(\psi\) is the present features containing both meaningful data \(\delta\) and meaningless features \(\delta^{*}\), \(\lambda\) is the feature tracking variable and \(F^{\prime}_{R}\) is the feature tracking function. The meaningless features are neglected to enhance the classification accuracy of the system.
where, \(\sigma_{g}\) indicates the extracted meaningful feature from the dataset. The removal of meaningless features is expressed in Eq. (4). The disease classification becomes more accurate by neglecting the meaningless features.
4.1.3 Disease Classification
After extracting the meaningful features, it is trained in such a way as to classify the diseases based on symptoms. The classification equation is expressed in Eq. (5).
where, \(G^{\prime}\) is the disease classification variable, \(S_{m}\) refers to the symptom, \(d_{Sm}\) indicates the disease symptoms, \(d\) refers to disease and \(\overline{d}\) indicates no disease.
4.1.4 Perturbation Function
The perturbation function provides data privacy by hiding the dataset features with external data. It alters the original data in a particular format to protect it from attacks. Also, a verification module is added in Perturbation to provide continuous monitoring [51]. Here, the random noise addition perturbation approach provides privacy in medical data. The general equation for Perturbation is represented in Eq. (6).
where Z-matrix is the original data, \(\varepsilon\)—matrix is the external data added to the original data for hiding, \(\hat{Z}\)—matrix is the new form of original data. The perturbation function is expressed in Eq. (7).
Moreover, the system outcomes are validated by launching attacks. After Perturbation, the classification is accurate even after launching attacks, as the attackers cannot access the dataset. Moreover, data privacy and security are enhanced by incorporating a verification module. Two important constraints are required to access the dataset file in the verification process: filename and password. The user can access the file if the filename and password are valid Fig. 4.
The functioning of the system is illustrated in pseudocode format in algorithm 1. The workflow of the designed HbMNS model is shown in Fig. 5. In the presented model, data privacy is verified by launching attacks before disease classification. If disease classification is accurate, then the system provides better outcomes.
5 Result and Discussion
The main objective of the HbMNS model is to protect medical data from attacks and to provide privacy to medical data. Here, the perturbation function is incorporated into the designed HbMNS model to give privacy to medical data. Also, the system's performance is validated by launching a DoS attack. Moreover, monitoring of the system is provided by the verification module. The implementation parameters description is listed in Table 1.
Moreover, the working of the presented model is validated with a case study. In addition, the outcomes of the executed model are estimated before and after fixing the perturbation function. At last, the improvement score of the designed model is calculated with comparative analysis.
5.1 Case Study
The case study explains the working of the presented model. Here, the proposed method is validated with case (1) Disease classification before launching an attack, case (2) Disease classification after launching an attack, and case (3) Disease classification after Perturbation Table (2).
Case 1: Disease classification before an attack.
The medical dataset containing the disease and symptoms features is initially imported into the system. Then, the imported dataset gets initialized like neurons in a modular neural network. After initialization, the input dataset is preprocessed to remove the error/ noise features. In the preprocessing phase, the noise features are removed; thus, the disease prediction can be accurate. After preprocessing, the next phase is feature extraction.
The present attributes in the preprocessed dataset are tracked and extracted in feature extraction. Then, the meaningless characteristics are neglected to enhance system performance. Therefore, the extracted dataset contains only the meaningful disease and symptoms characteristics. After feature extraction, the dataset is trained in such a way as to classify the disease under the symptoms. Before launching the attack, the disease classification is accurate. The system's performance before launching the attack is shown in Fig. 6.
Case 2: Disease classification after an attack.
After training the dataset, a DoS attack is launched to substantiate the system's performance. The system provides inaccurate classification after launching a DoS attack. For example, the system must classify the disease as a fungal infection according to symptoms such as itching, skin rash, and dyschromia patches. But the system classifies the disease as an allergy (inaccurate classification).
The system cannot provide accurate classification because the attacker changes the dataset attributes. The system's performance after launching an attack is shown in Fig. 7. After instigating the attack, data privacy and performance are minimized. Hence, the system's performance after launching an attack is lower than before.
Case 3: Disease classification after Perturbation.
In this case, the disease classification is estimated after incorporating the perturbation function. In the perturbation function, the filename and password are changed to the third form by multiplying them with other attributes without altering the original ones. The perturbation function protects the dataset and provides monitoring with a verification block. Thus, the dataset cannot be accessed unless the filename and password are known.
The results of the designed model after the Perturbation are shown in Fig. 8. Perturbation prevents attackers in the system and enhances system security by providing privacy to medical data. Thus, the system's performance after fixing the Perturbation is high. Also, it gives accurate disease classification.
The overall performance of the designed model is displayed in Fig. 9. The outcomes are enhanced after incorporating the perturbation function into the proposed design. After Perturbation, the users cannot access the file without a filename and password. Thus the privacy of data is improved in the designed model.
5.2 Comparative Analysis
A comparative assessment was made to determine the improvement score and manifest the better results of the designed model. The proposed HbMNS was validated with launching the attacks. As we expect, the proposed model effectively detects and removes the malicious. Here, the performance of the developed HbMNS model in prediction and neglecting the attack is compared with different models like Support Vector Machine (SVM) [52], K-star classification method (K-star CM) [53], Spatial Clustering of Applications Based on Density along with Noise (SCABDN) [34] and Multiple Channel Spatial–temporal Convolutional Neural Network (MCSCNN) [54] regarding the precision, f-measure, recall and accuracy.
F-measure: F-score is determined for estimating the data privacy provided by the system. Generally, the f-measure is calculated from the recall score and precision value. The equation for f-score estimation is expressed in Eq. (8).
where, \(R_{S}\) indicates the recall of the system and \(P_{V}\) refers to the precision value.
Recall- Score: Recall-score is estimated to measure the system performance by counting the true and false negatives of all positives attained. The recall-score equation is expressed in Eq. (9).
Here, \(X_{p}\) and \(Y_{n}\) refers to true and false negatives, respectively.
The comparison of the f-score and recall metric of the designed model with various models is shown in Fig. 10. Normally, the f-measure and recall of the system are calculated to estimate the system performance. The proposed model attained a high f-score and recall of 99.17% and 99.11%, respectively. At the same time, the f-score obtained by exiting models like SVM, SCABDN, and K-star CM is 98.4%, 95.78% and 93.99%, respectively. Similarly, the recall-score achieved by different models are 97.8%, 85.97%, and 95%, which is low compared to the proposed method.
Precision: Precision is estimated to measure the system's accuracy by classifying the true and false positives out of all positive values attained. The precision equation is expressed in Eq. (10).
where, \(X_{p}\) and \(Y_{p}\) refers to true and false positives, respectively.
The precision of the designed data privacy model with the existing model is shown in Fig. 11. The precision percentage achieved by the proposed model is 99.29%. But the precision obtained by the existing techniques like SCABDN, K-star CM, and MCSCNN is 96.63%, 94.5%, and 89.29%, respectively. The executed model attained high precision percentage than the existing designs.
Accuracy: Accuracy is determined to determine the system's performance. It determines how efficiently the proposed model provides privacy to medical data. Accuracy is calculated in terms of true and false positives and negatives. The accuracy equation is expressed in Eq. (11).
Here, \(X_{n}\) and \(Y_{n}\) defines true and false negatives, respectively.
The accuracy of the designed model is 99.18%, which is high compared to other designs. The accuracy achieved by other models like MCSCNN, K-star CN, SCABDN, and SVM is 95%, 95%, 96.81%, and 97%, respectively. The comparison of the accuracy of execution with other methods is shown in Fig. 12. The above analysis verified that the accuracy is enhanced in the presented model.
The comparative evaluation of the designed HbMNS model with various techniques is tabulated in Table 3. From the comparative assessment, the executed model provided better accuracy, precision, recall, and f-measure than the other models.
6 Discussion
A novel HbMNS model was proposed to protect the medical dataset from attacks and to provide privacy by hiding the data with a perturbation function. The Perturbation is incorporated into the executed model to give privacy to data with the verification module. The functioning of the system is explained in the case study. In addition, the system's outcomes are determined before and after incorporating perturbation fitness. In the end, the proposed model is validated with comparative analysis.
The evaluation of outcomes of the presented model is tabulated in Table 4. The outcomes of the executed model are evaluated through f-score, precision, recall, error rate, and accuracy. From comparative and performance evaluation, the results obtained by the presented model are high; that is, it achieved a high f-score of 99.17%, better accuracy of 99.18%, greater recall score of 99.11%, less error percentage of 0.82%, and high precision of 99.29%. Thus, the presented model provides better outcomes than other designs.
7 Conclusion
To protect the medical database from attackers, a hybrid HbMNS design was developed. The executed model is validated with disease classification. Incorporating the perturbation function in the presented model provides better outcomes and classification accuracy. Also, the working of the designed system is explained with a case study in three different cases. The results of the system are evaluated before and after Perturbation. Moreover, the system's accuracy is validated by launching attacks on the system. In addition, the comparative valuation verifies that the presented model achieves greater accuracy of 99.18%. That is, the accuracy of the system is improved by 2.18%. Moreover, the precision and recall score of the system is enhanced by 2.59% and 1.31%, respectively. Also, the error rate is minimized in the executed model by 2.13%. Hence, the presented model protects the data from attacks and provides data privacy by hiding the data.
Data Availability
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
Rajan, J. P., Rajan, S. E., Martis, R. J., & Panigrahi, B. K. (2020). Fog computing employed computer aided cancer classification system using deep neural network in internet of things based healthcare system. Journal of Medical Systems, 44(2), 1–10.
Biswal, A. K., Maiti, P., Bebarta, S., Sahoo, B., & Turuk, A. K. (2020). Authenticating IoT devices with blockchain. Advanced Applications of Blockchain Technology, pp. 177–205.
Tuli, S., Basumatary, N., Gill, S. S., Kahani, M., Arya, R. C., Wander, G. S., & Buyya, R. (2020). HealthFog: an ensemble deep learning based smart healthcare system for automatic diagnosis of heart diseases in integrated IoT and fog computing environments. Future Generation Computer Systems, 104(1), 187–200.
Narayanan, U., Paul, V., & Joseph, S. (2022). A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University-Computer and Information Sciences, 34(6), 3121–3135.
Kaur, P., Kumar, R., & Kumar, M. (2019). A healthcare monitoring system using random forest and internet of things (IoT). Multimedia Tools and Applications, 78(14), 19905–19916.
Rathi, M., & Rajavat, A. (2020, April). High Dimensional Data Processing in Privacy Preserving Data Mining. In 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT) (pp. 212–217). IEEE.
Saini, R., Kumar, P., Kaur, B., Roy, P. P., Dogra, D. P., & Santosh, K. C. (2019). Kinect sensor-based interaction monitoring system using the BLSTM neural network in healthcare. International Journal of Machine Learning and Cybernetics, 10(9), 2529–2540.
Ghosh, A., Raha, A., & Mukherjee, A. (2020). Energy-efficient IoT-health monitoring system using approximate computing. Internet of Things, 9(1), 100166.
Hao, Y., Usama, M., Yang, J., Hossain, M. S., & Ghoneim, A. (2019). Recurrent convolutional neural network based multimodal disease risk prediction. Future Generation Computer Systems, 92(1), 76–83.
Malathi, D., Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., & Sangaiah, A. K. (2019). Hybrid reasoning-based privacy-aware disease prediction support system. Computers & Electrical Engineering, 73(1), 114–127.
Gouse, S. M., & Mohan, G. K. (2022). A hybrid data perturbation and mean clustering approach based privacy preserving classification model for large databases. International Journal of System Assurance Engineering and Management, pp. 1–11.
Vijayashree, J., & Parveen Sultana, H. (2020). Heart disease classification using hybridized Ruzzo-Tompa memetic based deep trained Neocognitron neural network. Health and Technology, 10(1), 207–216.
Xu, Y., Bhuiyan, M. Z. A., Wang, T., Zhou, X., & Singh, A. K. (2022). C-fdrl: Context-aware privacy-preserving offloading through federated deep reinforcement learning in cloud-enabled IoT. IEEE Transactions on Industrial Informatics, 19(2), 1155–1164.
Lavanya, R., & Karpagam, M. (2020). Enhancing the security of AES through small scale confusion operations for data communication. Microprocessors and Microsystems, 75(1), 103041.
Gangireddy, V. K. R., Kannan, S., & Subburathinam, K. (2021). Implementation of enhanced blowfish algorithm in cloud environment. Journal of Ambient Intelligence and Humanized Computing, 12(3), 3999–4005.
Aghapour, S., Kaveh, M., Martín, D., & Mosavi, M. R. (2020). An ultra-lightweight and provably secure broadcast authentication protocol for smart grid communications. IEEE Access, 8, 125477–125487.
Muthu, B., Sivaparthipan, C. B., Manogaran, G., Sundarasekar, R., Kadry, S., Shanthini, A., & Dasel, A. (2020). IOT based wearable sensor for diseases prediction and symptom analysis in healthcare sector. Peer-to-peer networking and applications, 13(6), 2123–2134.
Bhattacharya, S., Maddikunta, P. K. R., Hakak, S., Khan, W. Z., Bashir, A. K., Jolfaei, A., & Tariq, U. (2020). Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset. Multimedia Tools and Applications, 81(1), 41429–41453.
Tzirakis, P., Chen, J., Zafeiriou, S., & Schuller, B. (2021). End-to-end multimodal affect recognition in real-world environments. Information Fusion, 68, 46–53.
Aitzaouiat, C. E., Latif, A., Benslimane, A., & Chin, H. H. (2022). Machine learning based prediction and modeling in healthcare secured internet of things. Mobile Networks and Applications, 27(1), 84–95.
Jamal, A. A., Majid, A. A. M., Konev, A., Kosachenko, T., & Shelupanov, A. (2021). A review on security analysis of cyber physical systems using Machine learning. Materials Today: Proceedings.
Suthar, M. S., Zimmerman, M. G., Kauffman, R. C., Mantus, G., Linderman, S. L., Hudson, W. H., & Wrammert, J. (2020). Rapid generation of neutralizing antibody responses in COVID-19 patients. Cell Reports Medicine, 1(3), 1000.
Li, D., Han, D., Weng, T. H., Zheng, Z., Li, H., Liu, H., & Li, K. C. (2022). Blockchain for federated learning toward secure distributed machine learning systems: A systemic survey. Soft Computing, 26(9), 4423–4440.
Mani, N., Singh, A., & Nimmagadda, S. L. (2020). An IoT guided healthcare monitoring system for managing real-time notifications by fog computing services. Procedia Computer Science, 167, 850–859.
AlZubi, A. A., Al-Maitah, M., & Alarifi, A. (2021). Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques. Soft Computing, 25(18), 12319–12332.
Sharma, P., Jain, S., Gupta, S., & Chamola, V. (2021). Role of machine learning and deep learning in securing 5G-driven industrial IoT applications. Ad Hoc Networks, 123(1), 102685.
Maniriho, P., Mahmood, A. N., & Chowdhury, M. J. M. (2022). A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges. Future Generation Computer Systems, 130, 1–18.
Thakkar, A., & Lohiya, R. (2021). A review on machine learning and deep learning perspectives of IDS for IoT: Recent updates, security issues, and challenges. Archives of Computational Methods in Engineering, 28(4), 3211–3243.
Sharma, S., Alam, A. M., & Chen, K. (2021). Image disguising for protecting data and model confidentiality in outsourced deep learning. In 2021 IEEE 14th International Conference on Cloud Computing (CLOUD) (pp. 71–77). IEEE.
Li, W., Chai, Y., Khan, F., Jan, S. R. U., Verma, S., Menon, V. G., & Li, X. (2021). A comprehensive survey on machine learning-based big data analytics for IoT-enabled smart healthcare system. Mobile Networks and Applications, 26(1), 234–252.
Lyu, L., Yu, H., Ma, X., Chen, C., Sun, L., Zhao, J., ... & Philip, S. Y. (2022). Privacy and robustness in federated learning: Attacks and defenses. IEEE transactions on neural networks and learning systems.
Unal, D., Hammoudeh, M., Khan, M. A., Abuarqoub, A., Epiphaniou, G., & Hamila, R. (2021). Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things. Computers & Security, 109(1), 102393.
Mohiyuddin, A., Javed, A. R., Chakraborty, C., Rizwan, M., Shabbir, M., & Nebhen, J. (2022). Secure cloud storage for medical IoT data using adaptive neuro-fuzzy inference system. International Journal of Fuzzy Systems, 24(2), 1203–1215.
Rashid, M., Singh, H., Goyal, V., Parah, S. A., & Wani, A. R. (2021). Big data based hybrid machine learning model for improving performance of medical Internet of Things data in healthcare systems. In Healthcare Paradigms in the Internet of Things Ecosystem (pp. 47–62). Academic Press.
Gadekallu, T. R., Manoj, M. K., Kumar, N., Hakak, S., & Bhattacharya, S. (2021). Blockchain-based attack detection on machine learning algorithms for IoT-Based e-health applications. IEEE Internet of Things Magazine, 4(3), 30–33.
Babar, M., Tariq, M. U., & Jan, M. A. (2020). Secure and resilient demand side management engine using machine learning for IoT-enabled smart grid. Sustainable Cities and Society, 62(1), 102370.
Golec, M., Ozturac, R., Pooranian, Z., Gill, S. S., & Buyya, R. (2021). iFaaSBus: A security and privacy based lightweight framework for serverless computing using IoT and machine learning. IEEE Transactions on Industrial Informatics., 18(5), 3522–3529.
Masud, M., Gaba, G. S., Alqahtani, S., Muhammad, G., Gupta, B. B., Kumar, P., & Ghoneim, A. (2020). A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care. IEEE Internet of Things Journal, 8(21), 15694–15703.
Alowibdi, J. S., Alshdadi, A. A., Daud, A., Dessouky, M. M., & Alhazmi, E. A. (2021). Coronavirus pandemic (COVID-19): Emotional toll analysis on Twitter. International Journal on Semantic Web and Information Systems (IJSWIS), 17(2), 1–21.
Rahman, M. A., Hossain, M. S., Alrajeh, N. A., & Gupta, B. B. (2021). A multimodal, multimedia point-of-care deep learning framework for COVID-19 diagnosis. ACM Transactions on Multimidia Computing Communications and Applications, 17(1s), 1–24.
Sedik, A., Hammad, M., Abd El-Samie, F. E., Gupta, B. B., & Abd El-Latif, A. A. (2021). Efficient deep learning approach for augmented detection of Coronavirus disease. Neural Computing and Applications, pp. 1–18.
Chopra, M., Singh, S. K., Gupta, A., Aggarwal, K., Gupta, B. B., & Colace, F. (2022). Analysis & prognosis of sustainable development goals using big data-based approach during COVID-19 pandemic. Sustainable Technology and Entrepreneurship, 1(2), 100012.
Pashchenko, D. (2021). fully remote software development due to COVID factor: Results of industry research (2020). International Journal of Software Science and Computational Intelligence (IJSSCI), 13(3), 64–70.
Zhou, Z., Gaurav, A., Gupta, B. B., Hamdi, H., & Nedjah, N. (2021). A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic. Neural Computing and Applications, pp. 1–14.
Tewari, A., & Gupta, B. B. (2020). Secure timestamp-based mutual authentication protocol for IoT devices using RFID tags. International Journal on Semantic Web and Information Systems (IJSWIS), 16(3), 20–34.
Bulla, C. M., & Birje, M. N. (2021). A multi-agent-based data collection and aggregation model for fog-enabled cloud monitoring. International Journal of Cloud Applications and Computing (IJCAC), 11(1), 73–92.
Adat, V., & Gupta, B. B. (2018). Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67, 423–441.
Zhang, J., Wang, Z., Wang, D., Zhang, X., Gupta, B. B., Liu, X., & Ma, J. (2021). A secure decentralized spatial crowdsourcing scheme for 6G-enabled network in box. IEEE Transactions on Industrial Informatics, 18(9), 6160–6170.
Horák, K., Bošanský, B., Tomášek, P., Kiekintveld, C., & Kamhoua, C. (2019). Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games. Computers & Security, 87(1), 101579.
Qiao, J. F., Lu, C., & Li, W. J. (2018). Design of dynamic modular neural network based on adaptive particle swarm optimization algorithm. IEEE Access, 6(1), 10850–10857.
Chamikara, M. A. P., Bertók, P., Liu, D., Camtepe, S., & Khalil, I. (2020). Efficient privacy preservation of big data for accurate data mining. Information Sciences, 527(1), 420–443.
Hosseini, N., Fakhar, F., Kiani, B., & Eslami, S. (2019). Enhancing the security of patients’ portals and websites by detecting malicious web crawlers using machine learning techniques. International journal of medical informatics, 132(1), 103976.
Akhbarifar, S., Javadi, H. H. S., Rahmani, A. M., & Hosseinzadeh, M. (2020). A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment. Personal and Ubiquitous Computing, pp. 1–17.
Malarvizhi Kumar, P., Hong, C. S., Chandra Babu, G., Selvaraj, J., & Gandhi, U. D. (2021). Cloud-and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseases. Soft Computing, 25(18), 12159–12174.
Acknowledgements
None
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no potential conflict of interest.
Ethical Approval
All applicable institutional and/or national guidelines for the care and use of animals were followed.
Informed Consent
For this type of study formal consent is not required.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Dansana, J., Kabat, M.R. & Pattnaik, P.K. A Novel Optimized Perturbation-Based Machine Learning for Preserving Privacy in Medical Data. Wireless Pers Commun 130, 1905–1927 (2023). https://doi.org/10.1007/s11277-023-10363-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10363-x