A Multi-Objective Bee Foraging Learning-based Particle Swarm Optimization Algorithm for Enhancing the Security of healthcare data in cloud system

Cloud computing is a potential platform transforming the health sector by allowing clinicians to monitor patients in real-time using sensor technologies. However, the users tend to transmit sensitive and classified medical data back and forth to cloud service providers for centralized processing and...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 11; p. 1
Main Authors Irshad, Reyazur Rashid, Sohail, Shahab Saquib, Hussain, Shahid, Madsen, Dag Oivind, Ahmed, Mohammed Altaf, Alattab, Ahmed Abdu, Alsaiari, Omar Ali Saleh, Norain, Khalid Ahmed Abdallah, Ahmed, Abdallah Ahmed Alzupair
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.01.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2169-3536
2169-3536
DOI10.1109/ACCESS.2023.3265954

Cover

More Information
Summary:Cloud computing is a potential platform transforming the health sector by allowing clinicians to monitor patients in real-time using sensor technologies. However, the users tend to transmit sensitive and classified medical data back and forth to cloud service providers for centralized processing and storage. This presents opportunities for hackers to steal data, intercept data in transit, and deprive patients and healthcare providers of private information. Consequently, Security and privacy are the primary concerns that must be addressed for the healthcare organization to trust and adopt the cloud computing platform. We present data sanitization and restoration processes to generate the keys from the acquired data and develop a multi-objective function for the hiding ratio, degree of modification, and information preservation ratio. We then employed the Bee-Foraging Learning-based Particle Swarm Optimization (BFL-PSO) algorithm to acquire the optimal key while transferring healthcare data into the cloud to ensure high Security. The experiment is carried out on the UHDDS dataset. The performance is assessed in terms of Security, delay time, encryption time, error rate, and convergence speed, with the results contrasted to state-of-the-art works. The performance study demonstrates that the suggested algorithm has higher Security than cutting-edge security algorithms.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2023.3265954