Tiger Hash Key (THK) Assisted Goat Optimisation Algorithm (GOA) for Intrusion Detection and Privacy Preserving of Electronic Health Records (EHR) in Distributed Cloud Data Environment.
Saved in:
| Title: | Tiger Hash Key (THK) Assisted Goat Optimisation Algorithm (GOA) for Intrusion Detection and Privacy Preserving of Electronic Health Records (EHR) in Distributed Cloud Data Environment. |
|---|---|
| Authors: | Sathya, A., Tharini, V. Jeevika, Aruna, A., Raj, Anamika, devi, N. Ambika |
| Source: | Frontiers in Health Informatics; 2024, Vol. 13 Issue 3, p950-963, 14p |
| Subject Terms: | OPTIMIZATION algorithms, UNCERTAINTY (Information theory), ELECTRONIC health records, INTERNET privacy, TRUST, INTRUSION detection systems (Computer security) |
| Abstract: | The emergence of the cloud environment necessitates privacy preservation and trust assurance that paves the way to embark on new privacy-preserving techniques. Novel and efficient privacy preservation techniques give users confidence in evolving issues relevant to privacy and cyber-related risks. In this research work, trust mode, robustness evaluation for unique key, and Tiger Hash Key (THK) generation mechanism assisted Goat Optimisation Algorithm (GOA). The Cloud Service Provider (CSP) trust is determined by the trust model, which is an essential process in Cloud Computing (CC) and the selection of CSP for further storage as well as the process of Electronic Health Record (EHR) data. The robustness evaluation is accomplished using Shannon entropy, where the cryptographic reliability is evaluated. The hybridized THK-CSP-assisted CC privacy preservation is efficient due to the combination of exploitation and exploration capability. The performance of proposed technique is analysed through simulation to show the efficiency of functionality and the privacypreserving mechanisms. Comparing to the state-of-art methods, the proposed THK-CSP for CC has highest Intrusion Detection Rate (IDR) of 97.456%. This goes to show that, when it comes to privacy and security, cloud systems are very efficient and come with high potency. [ABSTRACT FROM AUTHOR] |
| Copyright of Frontiers in Health Informatics is the property of Iranian Journal of Medical Informatics and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
Be the first to leave a comment!
Nájsť tento článok vo Web of Science