SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2180
Medical Big Data Protection using Fog Computing and Decoy Technique
Medha. M.R1, Ms.Krishnachalitha.K.C2
1Msc Computer Science, St.Joseph’s college (Autonomous), Irinjalakkuda, Thrissur, Kerala
2Assistant Professor, Dept of Computer Science, St.Joseph’s college (Autonomous), Irinjalakkuda, Thrissur, Kerala
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Nowadays in hospitalities the doctors use
medical data in the form of Electronic which is known as
Electronic Medical Records (EMR) .It contains multimedia
big data such as X-rays, ultrasounds, MRI reports etc. This
medical data is kept on the healthcare cloud for the efficient
storage and accessing. As the popularity of healthcare
clouding increases security issues related to this also
increases. The most serious issue is data theft attacks. In this
paper the main focus has been given to provide security for
the medical data stored in the healthcare cloud system
using fog computing facility and decoy technique.
Key Words: cloud computing, fog computing, decoy
file, MBD, OMBD, DMBD
1. INTRODUCTION
Medical big data in healthcare refers to the medical records
such as lab reports, x-rays, ultrasounds; MRI reports etc.
these data is huge and complex due to these factors it is
difficult to store in traditional software and hardware
facility. Hence we use a healthcare cloud system to place
those data. Healthcare cloud is a cloud computing facility
which is used as the storage medium for different medical
data. It provides the benefits of both software and
hardware through the provision of services over the
Internet. As the popularity of healthcare cloud increases
the attacks on the system is also increases the main issue is
related to security of those data stored in the system. The
security issues are legal issues, policy issues, data and
privacy protection etc. because of these problems cloud has
less security mechanism. The aim of this paper is to
provide hundred percentage of security to the big data
called Medical Big Data (MBD) in the healthcare cloud. For
this a technique called Decoy is used with Fog computing
facility. This technique provides a second gallery known as
Decoy Medical Big Data (DMBD) that appears as the
Original Medical Big Data (OMBD) to the attacker. In this
methodology when the attacker catches the system the
decoy files are retrieved and also it uses a double security
technique by encrypting the original file when an attacker
is realize that they deals with a decoy file then they need to
figure out the original data from the secured one hence this
methodology provides a 100% security to the data. The
advantage is that there is no need to worry if the user is an
attacker because only the decoy file is retrieved and
original file is hidden it only gets to the legitimate user
after successful verification. At the end we use a
compression algorithm to manage memory efficiently to
store these data.
2. TECHNICAL BACKGROUNDS
Cloud computing
Cloud computing is defined by the NIST (2009) as “a
model for enabling ubiquitous, convenient, on-demand
network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications,
and services) that can be rapidly provisioned and released
with minimal management effort or service provider
interaction” [1], [2].The service models provided by cloud
computing is categorized into three: (1) IaaS, which allows
users to take advantage of the infrastructure without
mentioning the hardware running behind it; (2) PaaS,
which builds on IaaS And provides clients with access to
basic operating software And optional services to develop
and use software applications without software
installation; and (3) SaaS, which enables clients to use
software applications without having to install them on
their personal computer, by offering these as a service
through the Internet [3]. We can categorize cloud
computing consistent with the deployment model into: (1)
a public cloud, in which the resources are sold or rented to
the public by the service provider, who at the same time is
the owner;(2) a private cloud owned or rented by an
organization; (3)community clouds, in which some closed
communities share the same cloud resources; and (4) a
hybrid cloud, which has the characteristics of two or more
deployment models [4].Several features are available in
cloud computing, for example: on-demand broad network
access, self-service, measured service, resource pooling,
and rapid elasticity. Self-service means that the customers
can manage and request their own resources. On the
Internet or in private networks, the services offered are
known as broad network access. In pooled Resources, the
customer draws from a pool of computing resources,
usually in a remote data center. The services can be scaled
larger or smaller, and customers are billed according to
the measured use of a service [18].
Fog computing
Fog computing is a method that provides different services
such as storing, processing and communication closer to
end user. Fog computing extends the cloud to the edge of
the network. Fog computing also can be defined as the
decoy generator and locate them beside real data to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2181
protect the original data. It provides different services
similar to decoys thus it can be considered as an
alternative for Decoy Document Distributor (D3). Which is
a tool for generating and monitoring decoys this strategy
is used to protect the real, sensitive data by providing
a”fog” of misinformation. Decoy information, such as
decoy documents, honey files, and honey pots, among
others, can be generated when unauthorized access is
detected. This confuses the attackers and makes them
believe that they have the real, useful data when they
actually do not. Decoys can be created manually by the
user him/herself; for example, when the user creates a
new document, he/she can create a fake document that
will appear as a mirror document but contains bogus
information. Such manual creation of decoys is obviously
very tiring for the user, especially if we are talking about a
large organization with multiple users and files. For this
reason, fog computing is used to create decoys with
minimal user intervention [5], [6], [7].
Decoy file
The basic idea behind this technique is to limit the damage
Caused by stolen data by decreasing the value of the stolen
Information. To achieve this, the decoy should have
certain Features. First, it should be believable. In the
absence of any Additional information, a perfectly
believable decoy should make it impossible for an attacker
to figure out that the Data are not real. Thus, the decoy
should seem authentic and trustworthy. Second, the decoy
should be enticing enough to attract the attention of the
attacker and make him/her open the File. Third, the decoy
should be conspicuous, which is closely Related to being
enticing. Whereas enticing is related to how Curious an
attacker is about a decoy, conspicuousness has to do with
how easy a decoy is to access. Therefore, the decoy should
be easily located by search queries. Fourth, the decoy
should be differentiable so that the real user can
distinguish between the real and the decoy file. Balancing
differentiability for authentic users with believability for
attackers is one of the critical aspects of any decoy
deployment system. Fifth, the decoy should be non-
interfering so that the real user will not accidentally
misuse the bogus information contained in the decoy.
Finally, the decoy should be detectable; this feature refers
to the ability of decoys to alert their owners once they
have been accessed [8], [9], [10].
3. ALGORITHMS
In our system we use different algorithms for security of
data stored in the healthcare cloud system. Previously said
that when a attacker tries to access the data only the decoy
files are retrieved and the original file is hidden it can be
only accessible by the legitimate users after a set of
verification tasks.
DMBD Algorithm
DMBD is like a trap gallery which is placed inside the fog
computing like a honey pot to provide protection to the
original data. The user directly accesses this DMBD the
original data is retrieved only to the legitimate user after
verifications. User profiling and decoy file systems are two
anomaly detection systems provided by fog computing. For
each uploaded data the corresponding Decoy data is
created instantly.
User Profiling
User profiling algorithm is used to check whether a user is
legitimate or not. It is performed on the basis of certain
parameters. These parameters include behavior of search,
amount of data downloaded, nature of operations, division
of tasks and IP address. There are three different types of
algorithms Explicit, Implicit and Hybrid. The Explicit
algorithm is gathering from user profile and it contains
high quality information but the difficulty is that it needs a
lot of effort to update the profile. To overcome this
problem Implicit is used it needs minimal effort from
humans because it automatically update the user profile.
Here we use Hybrid which is the combination of both
explicit and implicit because here we need a large amount
of interactions between the user and content.
Key Exchange algorithm
In this system there is a need to communicate the OMBD
agent and DMBD in different situations. For example, when
a user uploads medical data the OMBD agent need to
inform about this updating to the DMBD to create a decoy
file for the MBD this communication between these parties
should be secured.
Mutual Authentication Protocol
This one is need to make secure communication between
the parties those who communicate in this system. The
parties can be defined as any user who uses, access,
process on healthcare data.
Photo Encryption algorithm
This is used to encrypt photos to an understandable one.
There are different types of photo encrypting algorithms
are available here we use Blowfish algorithm. It is a
symmetric key cryptography and the key length is large it
make the algorithm most secured. It can encrypt any file
format of photo with any size. The inputs would be the
original photo and the encryption key. After that, based on
the Blowfish algorithm length, the photo will be divided.
The beginning of the array will be directly after the photo
header since the header would not be encrypted. The
array elements will be stored in rows, left to right ordered,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2182
with every photo scan line represented by one row, and
the photo rows will be encrypted from top to bottom [11].
Photo Decryption algorithm
This algorithm is used to provide the reverse of the
encrypted photo. This process gives the original form of
the photo. Here the same encryption key is used but the
sub keys might be different.
Original MBD algorithm
This contains the original data and it is placed in the cloud
system. The data is first upload to this system then using
key exchange algorithm the corresponding decoy file is
generated on fog system. The data in the cloud is
encrypted to provide a double security for the OMBD.
LZW algorithm
LZW stands for Lempel Ziv Welch and which is used to
compress the huge and complex data for effective memory
utilization. There are two types of compression one is
without losing any data and the other is with loss of data.
LZW is a lossless compression algorithm that is there is no
loss of data when compressing the huge data.
3. PROPOSED SYSTEM
The system is mainly focused on providing protection for
the Medical Big Data in healthcare cloud using Decoy
technique with fog computing facility. Here a decoy file
called Decoy gallery or illusion gallery is created using
decoy technique. This gallery is placed in the fog system
which is closer to the end user and the user whether
legitimate or attacker is access this data first. On the other
hand the original medical data kept inside cloud with
encrypted form. To confirm whether the user is legitimate
or not using user profiling algorithm the legitimate user is
entered only to the original data only after this verification.
There is nothing to worry if any hacker gets access to the
decoy file they get only the imaginary form of the original
data and the hacker believe that they got the original one.
The parties who came to use this system need to verify
their authentication using Authentication protocol. At the
end we use a compression algorithm to manage memory
efficiently to store these data. Lempel Ziv Welch (LZW) is
used as compression algorithm which is used to compress
the huge and complex data for effective memory utilization.
There are two types of compression one is without losing
any data and the other is with loss of data. LZW is a lossless
compression algorithm that is there is no loss of data when
compressing the huge data.
4. CONCLUSION
We have already familiar with different methods or
techniques to make secure different types of data. Here we
focus on providing security for the records of patients in
Hospitals. For this we use Decoy technique with fog
computing facility. Here two galleries are created one is
OMBD which is kept in the cloud and other is DMBD which
is kept inside the fog. The user is first access DMBD and
the OMBD is get only after verifying the user is original
one. This technique provides more security to the data.
REFERENCES
1) I. Foster, Yong Zhao, I. Raicu, and Shiyong Lu.
Cloud Computing and Grid Computing 360-Degree
Compared. Grid Computing Environments
Workshop, Austin, 2008.
2) P. T. Grance. (October 2009) The NIST Definition
of Cloud Computing. Available
online:http://csrc.nist.gov/groups/SNS/cloud-
computing
3) Flavio Lombardi and Roberto Di Pietro. Secure
Virtualization for Cloud Computing. Journal of
Network and Computer Applications 2010,
Volume 6, pp. 1-10.
4) Zawoad and R. Hasan. (Feb 2013) Cloud forensics:
a meta-study of challenges, approaches, and open
problems. Available online:
http://arxiv.org/abs/1302.6312
5) Jonathan Voris, Jermyn Jill, Angelos Keromytis,
and Salvatore Stolfo. Bait and Snitch: Defending
Computer Systems with Decoys. Columbia
University Academic Commons, 2013.
6) J. Stolfo Salvator, Malek Ben Salem, and D.Angelos
Kero. Fog Computing:Mitigating Insider Data
Theft Attacks in the Cloud. In IEEE CS Security and
Privacy Workshops, 2012.
7) Bhaludra Raveendranadh Singh, S. Sunanda,
Moligi Sangeetha Y. LakshmiKanth. A Secure
Framework for Mollifying Attacks in
Cloud.International Journal of Computer Trends
and Technology 2014, Volume16, pp. 204-207.
8) Siddhesh P Karekar and Sachin M Vaidya.
Perspective of Decoy Technique using Mobile Fog
Computing with Effect to Wireless Environment.
International Journal of Scientific Engineering and
Technology Research 2015, Volume 4, pp. 2620 -
2626.
9) Majid Hajibaba and Saeid Gorgin. A Review on
Modern Distributed Computing Paradigm: Cloud
Computing, Jungle Computing and Fog Computing.
Journal of Computing and Information Technology
2014, Volume 2, pp. 69-84.
10) Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and
Sateesh Addepalli. Fog Computing and its Role in
the Internet of Things. In Proceedings of the First
Edition of the MCC Workshop on Mobile Cloud
Computing, 2012.
11) Pia Singh, Image Encryption and Decryption Using
Blowfish Algorithm in MATLAB. International
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2183
Journal of Scientific & Engineering Research 2013,
Volume 4, pp. 150-154.

More Related Content

PDF
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
PDF
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
PDF
Security and privacy approach of cloud computing
PDF
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
PDF
Securing Cloud Using Fog: A Review
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
Employment Feedback by Securing Data using Anonymous Authentication
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
Security and privacy approach of cloud computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
Securing Cloud Using Fog: A Review
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Employment Feedback by Securing Data using Anonymous Authentication
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...

What's hot (17)

PDF
A Novel Information Accountability Framework for Cloud Computing
PDF
Cloud Computing
PDF
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
Cloud Auditing With Zero Knowledge Privacy
PDF
Challenges and Proposed Solutions for Cloud Forensic
PDF
5.[40 44]enhancing security in cloud computing
PDF
Security Issues in Cloud Computing by rahul abhishek
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
Enhanced security framework to ensure data security
PDF
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
PDF
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
PDF
A survey on cloud security issues and techniques
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
PDF
International Journal of Engineering Research and Development
PDF
Cloud Data Security using Elliptic Curve Cryptography
PDF
An efficient and secure data storage in cloud computing using modified RSA pu...
A Novel Information Accountability Framework for Cloud Computing
Cloud Computing
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Encryption Technique for a Trusted Cloud Computing Environment
Cloud Auditing With Zero Knowledge Privacy
Challenges and Proposed Solutions for Cloud Forensic
5.[40 44]enhancing security in cloud computing
Security Issues in Cloud Computing by rahul abhishek
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
A survey on cloud security issues and techniques
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
International Journal of Engineering Research and Development
Cloud Data Security using Elliptic Curve Cryptography
An efficient and secure data storage in cloud computing using modified RSA pu...
Ad

Similar to IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique (20)

PDF
FOGCOMPUTING
PDF
Hindering data theft attack through fog computing
PPTX
project 11
PDF
Fog computing a new concept to minimize the attacks and to provide security i...
PDF
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
PPTX
cloud security using Fog Computing
DOCX
Fog computing document
PPT
Fog computing provide security to data in cloud ppt
PDF
PHD research publications
PDF
Top Journals
PDF
Fast publication journals
PDF
computer science journals
PDF
UGC care journals
PDF
CTM 2.pdf
PDF
DOCX
fog computing provide security to the data in cloud
DOCX
Fog doc
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
PDF
Improving Data Storage Security in Cloud using Hadoop
PPT
Privacy Issues of Cloud Computing in the Federal Sector
FOGCOMPUTING
Hindering data theft attack through fog computing
project 11
Fog computing a new concept to minimize the attacks and to provide security i...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
cloud security using Fog Computing
Fog computing document
Fog computing provide security to data in cloud ppt
PHD research publications
Top Journals
Fast publication journals
computer science journals
UGC care journals
CTM 2.pdf
fog computing provide security to the data in cloud
Fog doc
Enhancing Data Storage Security in Cloud Computing Through Steganography
Improving Data Storage Security in Cloud using Hadoop
Privacy Issues of Cloud Computing in the Federal Sector
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Well-logging-methods_new................
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
web development for engineering and engineering
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
DOCX
573137875-Attendance-Management-System-original
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
composite construction of structures.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
additive manufacturing of ss316l using mig welding
Embodied AI: Ushering in the Next Era of Intelligent Systems
Well-logging-methods_new................
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Internet of Things (IOT) - A guide to understanding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
CH1 Production IntroductoryConcepts.pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
web development for engineering and engineering
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
R24 SURVEYING LAB MANUAL for civil enggi
573137875-Attendance-Management-System-original
Operating System & Kernel Study Guide-1 - converted.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
OOP with Java - Java Introduction (Basics)
composite construction of structures.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026

IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2180 Medical Big Data Protection using Fog Computing and Decoy Technique Medha. M.R1, Ms.Krishnachalitha.K.C2 1Msc Computer Science, St.Joseph’s college (Autonomous), Irinjalakkuda, Thrissur, Kerala 2Assistant Professor, Dept of Computer Science, St.Joseph’s college (Autonomous), Irinjalakkuda, Thrissur, Kerala ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays in hospitalities the doctors use medical data in the form of Electronic which is known as Electronic Medical Records (EMR) .It contains multimedia big data such as X-rays, ultrasounds, MRI reports etc. This medical data is kept on the healthcare cloud for the efficient storage and accessing. As the popularity of healthcare clouding increases security issues related to this also increases. The most serious issue is data theft attacks. In this paper the main focus has been given to provide security for the medical data stored in the healthcare cloud system using fog computing facility and decoy technique. Key Words: cloud computing, fog computing, decoy file, MBD, OMBD, DMBD 1. INTRODUCTION Medical big data in healthcare refers to the medical records such as lab reports, x-rays, ultrasounds; MRI reports etc. these data is huge and complex due to these factors it is difficult to store in traditional software and hardware facility. Hence we use a healthcare cloud system to place those data. Healthcare cloud is a cloud computing facility which is used as the storage medium for different medical data. It provides the benefits of both software and hardware through the provision of services over the Internet. As the popularity of healthcare cloud increases the attacks on the system is also increases the main issue is related to security of those data stored in the system. The security issues are legal issues, policy issues, data and privacy protection etc. because of these problems cloud has less security mechanism. The aim of this paper is to provide hundred percentage of security to the big data called Medical Big Data (MBD) in the healthcare cloud. For this a technique called Decoy is used with Fog computing facility. This technique provides a second gallery known as Decoy Medical Big Data (DMBD) that appears as the Original Medical Big Data (OMBD) to the attacker. In this methodology when the attacker catches the system the decoy files are retrieved and also it uses a double security technique by encrypting the original file when an attacker is realize that they deals with a decoy file then they need to figure out the original data from the secured one hence this methodology provides a 100% security to the data. The advantage is that there is no need to worry if the user is an attacker because only the decoy file is retrieved and original file is hidden it only gets to the legitimate user after successful verification. At the end we use a compression algorithm to manage memory efficiently to store these data. 2. TECHNICAL BACKGROUNDS Cloud computing Cloud computing is defined by the NIST (2009) as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” [1], [2].The service models provided by cloud computing is categorized into three: (1) IaaS, which allows users to take advantage of the infrastructure without mentioning the hardware running behind it; (2) PaaS, which builds on IaaS And provides clients with access to basic operating software And optional services to develop and use software applications without software installation; and (3) SaaS, which enables clients to use software applications without having to install them on their personal computer, by offering these as a service through the Internet [3]. We can categorize cloud computing consistent with the deployment model into: (1) a public cloud, in which the resources are sold or rented to the public by the service provider, who at the same time is the owner;(2) a private cloud owned or rented by an organization; (3)community clouds, in which some closed communities share the same cloud resources; and (4) a hybrid cloud, which has the characteristics of two or more deployment models [4].Several features are available in cloud computing, for example: on-demand broad network access, self-service, measured service, resource pooling, and rapid elasticity. Self-service means that the customers can manage and request their own resources. On the Internet or in private networks, the services offered are known as broad network access. In pooled Resources, the customer draws from a pool of computing resources, usually in a remote data center. The services can be scaled larger or smaller, and customers are billed according to the measured use of a service [18]. Fog computing Fog computing is a method that provides different services such as storing, processing and communication closer to end user. Fog computing extends the cloud to the edge of the network. Fog computing also can be defined as the decoy generator and locate them beside real data to
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2181 protect the original data. It provides different services similar to decoys thus it can be considered as an alternative for Decoy Document Distributor (D3). Which is a tool for generating and monitoring decoys this strategy is used to protect the real, sensitive data by providing a”fog” of misinformation. Decoy information, such as decoy documents, honey files, and honey pots, among others, can be generated when unauthorized access is detected. This confuses the attackers and makes them believe that they have the real, useful data when they actually do not. Decoys can be created manually by the user him/herself; for example, when the user creates a new document, he/she can create a fake document that will appear as a mirror document but contains bogus information. Such manual creation of decoys is obviously very tiring for the user, especially if we are talking about a large organization with multiple users and files. For this reason, fog computing is used to create decoys with minimal user intervention [5], [6], [7]. Decoy file The basic idea behind this technique is to limit the damage Caused by stolen data by decreasing the value of the stolen Information. To achieve this, the decoy should have certain Features. First, it should be believable. In the absence of any Additional information, a perfectly believable decoy should make it impossible for an attacker to figure out that the Data are not real. Thus, the decoy should seem authentic and trustworthy. Second, the decoy should be enticing enough to attract the attention of the attacker and make him/her open the File. Third, the decoy should be conspicuous, which is closely Related to being enticing. Whereas enticing is related to how Curious an attacker is about a decoy, conspicuousness has to do with how easy a decoy is to access. Therefore, the decoy should be easily located by search queries. Fourth, the decoy should be differentiable so that the real user can distinguish between the real and the decoy file. Balancing differentiability for authentic users with believability for attackers is one of the critical aspects of any decoy deployment system. Fifth, the decoy should be non- interfering so that the real user will not accidentally misuse the bogus information contained in the decoy. Finally, the decoy should be detectable; this feature refers to the ability of decoys to alert their owners once they have been accessed [8], [9], [10]. 3. ALGORITHMS In our system we use different algorithms for security of data stored in the healthcare cloud system. Previously said that when a attacker tries to access the data only the decoy files are retrieved and the original file is hidden it can be only accessible by the legitimate users after a set of verification tasks. DMBD Algorithm DMBD is like a trap gallery which is placed inside the fog computing like a honey pot to provide protection to the original data. The user directly accesses this DMBD the original data is retrieved only to the legitimate user after verifications. User profiling and decoy file systems are two anomaly detection systems provided by fog computing. For each uploaded data the corresponding Decoy data is created instantly. User Profiling User profiling algorithm is used to check whether a user is legitimate or not. It is performed on the basis of certain parameters. These parameters include behavior of search, amount of data downloaded, nature of operations, division of tasks and IP address. There are three different types of algorithms Explicit, Implicit and Hybrid. The Explicit algorithm is gathering from user profile and it contains high quality information but the difficulty is that it needs a lot of effort to update the profile. To overcome this problem Implicit is used it needs minimal effort from humans because it automatically update the user profile. Here we use Hybrid which is the combination of both explicit and implicit because here we need a large amount of interactions between the user and content. Key Exchange algorithm In this system there is a need to communicate the OMBD agent and DMBD in different situations. For example, when a user uploads medical data the OMBD agent need to inform about this updating to the DMBD to create a decoy file for the MBD this communication between these parties should be secured. Mutual Authentication Protocol This one is need to make secure communication between the parties those who communicate in this system. The parties can be defined as any user who uses, access, process on healthcare data. Photo Encryption algorithm This is used to encrypt photos to an understandable one. There are different types of photo encrypting algorithms are available here we use Blowfish algorithm. It is a symmetric key cryptography and the key length is large it make the algorithm most secured. It can encrypt any file format of photo with any size. The inputs would be the original photo and the encryption key. After that, based on the Blowfish algorithm length, the photo will be divided. The beginning of the array will be directly after the photo header since the header would not be encrypted. The array elements will be stored in rows, left to right ordered,
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2182 with every photo scan line represented by one row, and the photo rows will be encrypted from top to bottom [11]. Photo Decryption algorithm This algorithm is used to provide the reverse of the encrypted photo. This process gives the original form of the photo. Here the same encryption key is used but the sub keys might be different. Original MBD algorithm This contains the original data and it is placed in the cloud system. The data is first upload to this system then using key exchange algorithm the corresponding decoy file is generated on fog system. The data in the cloud is encrypted to provide a double security for the OMBD. LZW algorithm LZW stands for Lempel Ziv Welch and which is used to compress the huge and complex data for effective memory utilization. There are two types of compression one is without losing any data and the other is with loss of data. LZW is a lossless compression algorithm that is there is no loss of data when compressing the huge data. 3. PROPOSED SYSTEM The system is mainly focused on providing protection for the Medical Big Data in healthcare cloud using Decoy technique with fog computing facility. Here a decoy file called Decoy gallery or illusion gallery is created using decoy technique. This gallery is placed in the fog system which is closer to the end user and the user whether legitimate or attacker is access this data first. On the other hand the original medical data kept inside cloud with encrypted form. To confirm whether the user is legitimate or not using user profiling algorithm the legitimate user is entered only to the original data only after this verification. There is nothing to worry if any hacker gets access to the decoy file they get only the imaginary form of the original data and the hacker believe that they got the original one. The parties who came to use this system need to verify their authentication using Authentication protocol. At the end we use a compression algorithm to manage memory efficiently to store these data. Lempel Ziv Welch (LZW) is used as compression algorithm which is used to compress the huge and complex data for effective memory utilization. There are two types of compression one is without losing any data and the other is with loss of data. LZW is a lossless compression algorithm that is there is no loss of data when compressing the huge data. 4. CONCLUSION We have already familiar with different methods or techniques to make secure different types of data. Here we focus on providing security for the records of patients in Hospitals. For this we use Decoy technique with fog computing facility. Here two galleries are created one is OMBD which is kept in the cloud and other is DMBD which is kept inside the fog. The user is first access DMBD and the OMBD is get only after verifying the user is original one. This technique provides more security to the data. REFERENCES 1) I. Foster, Yong Zhao, I. Raicu, and Shiyong Lu. Cloud Computing and Grid Computing 360-Degree Compared. Grid Computing Environments Workshop, Austin, 2008. 2) P. T. Grance. (October 2009) The NIST Definition of Cloud Computing. Available online:http://csrc.nist.gov/groups/SNS/cloud- computing 3) Flavio Lombardi and Roberto Di Pietro. Secure Virtualization for Cloud Computing. Journal of Network and Computer Applications 2010, Volume 6, pp. 1-10. 4) Zawoad and R. Hasan. (Feb 2013) Cloud forensics: a meta-study of challenges, approaches, and open problems. Available online: http://arxiv.org/abs/1302.6312 5) Jonathan Voris, Jermyn Jill, Angelos Keromytis, and Salvatore Stolfo. Bait and Snitch: Defending Computer Systems with Decoys. Columbia University Academic Commons, 2013. 6) J. Stolfo Salvator, Malek Ben Salem, and D.Angelos Kero. Fog Computing:Mitigating Insider Data Theft Attacks in the Cloud. In IEEE CS Security and Privacy Workshops, 2012. 7) Bhaludra Raveendranadh Singh, S. Sunanda, Moligi Sangeetha Y. LakshmiKanth. A Secure Framework for Mollifying Attacks in Cloud.International Journal of Computer Trends and Technology 2014, Volume16, pp. 204-207. 8) Siddhesh P Karekar and Sachin M Vaidya. Perspective of Decoy Technique using Mobile Fog Computing with Effect to Wireless Environment. International Journal of Scientific Engineering and Technology Research 2015, Volume 4, pp. 2620 - 2626. 9) Majid Hajibaba and Saeid Gorgin. A Review on Modern Distributed Computing Paradigm: Cloud Computing, Jungle Computing and Fog Computing. Journal of Computing and Information Technology 2014, Volume 2, pp. 69-84. 10) Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. Fog Computing and its Role in the Internet of Things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 2012. 11) Pia Singh, Image Encryption and Decryption Using Blowfish Algorithm in MATLAB. International
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2183 Journal of Scientific & Engineering Research 2013, Volume 4, pp. 150-154.