Adebayo O T1* and Fasidi F O2
Received: February 19, 2019; Published: February 27, 2019
*Corresponding author: Adebayo O T, Professor, Department of Information Technology, Nigeria
This paper presents a model for securing genomic data in the cloud. The proposed model is a four-level defense mechanism (4ldm) to ensure privacy. Authentication, privacy protection, file encryption, trust behavior of cloud services is modeled for first, second, third and fourth levels of defense respectively. Each level performs its own duty to ensure data privacy and in case one level is deceived by illegal means or malign user enters the system, movement will be made to the next level of defence. The next level of defence will then try to prevent the possible attack until the last level.
Keywords: Cloud Computing; Medical Data; Healthcare; Multi-Level Defense System; Trust Management
Cloud Computing Is the Practice of Using A Network of Remote Servers Hosted on The Internet to Store, Manage, And Process Data, Rather Than A Local Server Or A Personal Computer . There Is A Surge of Interest Among Healthcare Companies Regarding the Potential of Cloud Computing and Many Countries Have Started Moving Healthcare-Related Applications Across To Cloud Platforms . Basically, There Are Three Service Delivery Models For Cloud Computing: Software As A Service (Saas) In Which Cloud Customers Use The Provider’s Applications Over The Internet, Platform As A Service (Paas) In Which Customers Deploy Their Self-Created Applications On A Development Platform That A Cloud Service Provider Provides And Infrastructure As A Service (Iaas) In Which Cloud Customers Rent Processing, Storage, Network Capacity From Cloud Service Provider. The Cloud Computing Paradigm Is Associated with Security Concerns Both at The Providers’ End and Consumers’ End. While Providers Want to Ensure That Their Resources and Services Are Utilized Only by Authorized Users; Consumers Would Like To Ensure That Their Data Is Securely Maintained In The Cloud And That The Servers Are Not Compromised. It Is Possible to Facilitate Availability of Genomics Anytime and Anywhere Through Cloud-Based Services If Data Is Stored On The Cloud, But According To , A Lot Of Questions Could Be Asked By User: Is My Data Secure In Cloud? Can Others Have Access to My Confidential Data? How Compliant Are Cloud Service Provider to Government Cyber Security Policies And Regulations? What Happens When an Attacker Brings Down Applications Hosted on The Cloud Using Malware And Other Means? This Research Proposes an Integration of Multi-Level Defense Mechanism For Enhanced Security Of Medical Data In The Cloud. Authentication, Privacy Protection File Encryption, And Trust Management Service I.E. Trust Behavior of The Cloud Service for Healthcare Delivery Are Modeled. The Remaining Parts of This Paper Are Structure as Follows: Section 2 Presents the Advantages of Cloud Computing To Healthcare; Section 3 Presents The Proposed Data Security Model For Healthcare Delivery In The Cloud; Section 4 Presents The Conclusion Which Is Drawn From The Findings. Cloud Computing Is Gaining More Popularity, More Organizations and Enterprises Are Moving Towards Cloud, But the Key Concern Has Been Security . Healthcare Industries Are Motivated to Use Cloud Facility Because Healthcare Data Are ‘Big Data’. The Various Challenges That Are Peculiar with Volume, Veracity, Variety, Value, Velocity and Variety. Some Advantages That Cloud Storage Offers Over Traditional IT Infrastructure Are
I. Flexibility: Users Can Scale Services to Fit Their Needs, Customize Applications and Access Cloud Services from Anywhere with an Internet Connection.
II. Efficiency: Enterprise Users Can Get Applications to Market Quickly, Without Worrying About Underlying Infrastructure Costs or Maintenance.
III. Strategic Value: Cloud Services Give Enterprises A Competitive Advantage by Providing The Most Innovative Technology Available.
With cloud computing, patients’ digitized health information such as medical histories scanned images, blood types, allergies and genomic data can be stored in the cloud and made accessible via secure authentication to people authorized by the patient . Subscribing to a cloud solution for storing and sharing the huge data files can save hospitals, physicians and other organizations in the healthcare value chain heavy up-front investments in high capacity systems, while also boosting speed and efficiency . Medical records and images can be shared with medical practitioners worldwide in real time, treatment and outcomes can be monitored remotely . Medical data gathered by healthcare providers are massive, complex, and difficult to store with traditional IT infrastructure and data management tools. They include clinical data, prescription data of patients, medical images, laboratory data, data from pharmacy and insurance departments, and data gathered from social media sources [1,6]. A (4ldm) can be considered for privacy preservation, each stage performs its own duty to ensure that data security of medical data in the cloud.
The Genome Contains the Hereditary Information of An Organism. The Human Genome Is Encoded in Deoxyribonucleic Acid Molecules Which We Commonly Known As DNA. DNA Molecules Consist of Two Biopolymer Chains Each of Which in Turn Consists of Nucleotides. These Nucleotides Are Represented As A, C, G, T Which Are the Acronyms of Adenine, Cytosine, Guanine and Thymine Respectively. In DNA, These Nucleotides Form Base Pairs by Making Bonds With Each Other: A Bonds with T and C Bonds with G. There Are 3 Billion Base Pairs in Whole Haploid Human Genome Sequence, Distributed Across 23 Chromosomes. The DNA Of Two Different Individuals Are Almost Identical (99%). In Fact,  Showed That DNA Of Two Individuals Differ No More Than By 0.5%. This Small Amount of Variations Distinguishes One Individual from Another. Several Types of Genetic Variations Occur in Human Population, Such as Single-Nucleotide Polymorphism (SNP), Copy-Number Variations (Cnvs), Rearrangement Etc. Single Nucleotide Polymorphism (SNP) Is the Most Common Form of DNA Variation at A Specific Position in The Genome, Which Represents A Difference In A Single Nucleotide. Most of The Snps Do Not Have Any Effect on Human Health. But Some Snps Are Directly Responsible for Developing A Particular Disease in The Human Body. For Genomic data collector (gdc) to have access to genomic information of patients; four levels must be passed through. They are Authentication, privacy protection, Genomic data encryption and Trust management levels.
The Gdc (S) Needs Authentication, Each Must Have Unique ID and Passwords. If the User Authentication System Is Deceived by Illegal Means, And Malign User Enters the System, Then Movement Is Made To Next Level Of Defence.
Role-based access control (RBAC) can be used as an effective means of privacy protection . The model is built on top of some basic sets, described as follows:
i. U: set of all users (human-being interacting with the cloud services). An element in U can be any convenient representation that uniquely identifies a user in a system
ii. S: set of all services. The system is composed of a collection of services
iii. N: set of all role names
iv. E: set of all environmental constraints
v. O: set of all objects
vi. A: set of all access modes for objects
vii. R: set of all roles. A role is a named job function or title within an organization that is associated with some service; a role is specific to a service [9,10].
viii. P: set of all privilege. A privilege is a right to perform some operation on a particular object. Services confer privileges on their role members and may also recognize the roles of other services. Some definitions are provided [11-13].
Definition 1: A role r ∈ R is a pair (s, n) ∈ S × N, where s ∈ S is a service and n ∈ N is the name of a role defined by s.
Definition 2: A privilege p ∈ P is a pair (o, a) ∈ O × A, where o ∈ O is an object and a ∈ A is an access mode for the object o. All the elements in Role-based access control (RBAC) can be used to model effective means of privacy protection for medical data.
Using File Encryptions Allow Complex Mathematical Operations to Be Performed. In This Layer Genomic Data Is Encrypted, Even If the Key was the Illegally Accessed, Through Privacy Protection, Malign User Will Still Be Not Unable To Obtain Effective Access To Information, Which Is Very Important To Protect Business Users’ Trade Secrets In Cloud Computing Environment .
Trust behavior(s)of the Cloud service for healthcare delivery is modeled using equation (1).
When User U uses cloud service S, |υ (s) | denotes feedbacks given to the Cloud services. F is a set of feedback (i.e based on several Quality of service (QoS) parameters including availability, security and response time) and tis the timestamps when feedbacks are given [14-16]. |υ (s) | represents the total number of trust feedbacks. F(U, S) are the feedbacks the U users weighted by attacks detection factors. Q(s,to,t) .Δ(s,to,t) is the change rate of trust results in a period of time that allow (TM) adjust results for Cloud services that have been affected by Malicious behavior. X is the normalized weight factor for the change rate of trust results which increases the adaptability. Since trust and identification are closely related, the identity Management Service (idM) can facilitate TMS in detection of attacks against cloud services without breaching the privacy of customer the combination of the proposed (4LDM) can be used to enhance security of medical data in the cloud.
Given That Ƹ is a Finite Set of DNA Alphabets A(Adenine), C(Cytosine), G(Guanine) And T(Thiamine) Are Set of DNA Characters or Bases.
The Four-Level Defense Design for Health Data Privacy Protection in The Cloud Is Represented In Equation (2) As:
Where P Is the Privacy Protection, N Is the Number of Individuals Involved.
The benefits of cc to healthcare can never be over emphasized. In this research work, we have carried out an in-depth exploration of cloud computing benefits to healthcare systems. Despite the significant benefits of cc to healthcare, security and privacy of medical data are some of the key challenges and barriers that have led to slow adoption in developing countries and other parts of the world. The proposed model is a multi-level defense mechanism to ensure the security and privacy of patients’ medical data. Authentication, privacy protection, file encryption, trust behavior of the cloud service for healthcare delivery are modeled. Each level performs its own duty to ensure that data security but if one level is deceived by illegal means, and malign user enters the system, then movement is made to the next defence. Healthcare sector in developing nations will benefit tremendously from the proposed model for improve services if fully Implemented.
Bio chemistryUniversity of Texas Medical Branch, USA
Department of Criminal JusticeLiberty University, USA
Department of PsychiatryUniversity of Kentucky, USA
Department of MedicineGally International Biomedical Research & Consulting LLC, USA
Department of Urbanisation and AgriculturalMontreal university, USA
Oral & Maxillofacial PathologyNew York University, USA
Gastroenterology and HepatologyUniversity of Alabama, UK
Department of MedicineUniversities of Bradford, UK
OncologyCirculogene Theranostics, England
Radiation ChemistryNational University of Mexico, USA
Analytical ChemistryWentworth Institute of Technology, USA
Minimally Invasive SurgeryMercer University school of Medicine, USA
Pediatric DentistryUniversity of Athens , Greece
The annual scholar awards from Lupine Publishers honor a selected number Read More...
We know the financial complexity of Individual read more...
The annual scholar awards from Lupine Publishers honor a selected number read more...