Machine Learning based Encryption Framework for Privacy Preservation in Covid 19 Data

Machine Learning based Encryption Framework for Privacy Preservation in Covid 19 Data

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-6
Year of Publication : 2022
Authors : R. Karunia krishnapriya, G. Vinodhini, R. Suban, K. Sakthivel
DOI : 10.14445/22315381/IJETT-V70I6P206

How to Cite?

R. Karunia krishnapriya, G. Vinodhini, R. Suban, K. Sakthivel, "Machine Learning based Encryption Framework for Privacy Preservation in Covid 19 Data," International Journal of Engineering Trends and Technology, vol. 70, no. 6, pp. 47-53, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I6P206

Abstract
With the ongoing pandemic of COVID-19, numerous bits of intelligence are required to analyse the type of infection and mutation that is undergoing around the globe. However, while processing these data, privacy is another major field that requires concentration since it involves user data privacy. Hence, preserving privacy while processing the images is required for optimal management and security consideration of big data analytics. In this paper, the study models a machine learning method that is integrated with encryption models for optimal data encryption and thereby maintaining the privacy preservation of data. The privacy preservation using the proposed data encryption model is tested under two problems involving digit recognition and medical image application in classifying the computed tomography images of lungs from various covid-19 patients. The simulation was conducted to test the efficacy of the privacy preservation method in providing data privacy while the data has been classified. The simulation results show that the proposed machine learning encryption model enables optimal privacy of user data than other existing methods.

Keywords
Privacy Preservation, Bigdata Analytics, Covid-19, Machine Learning.

Reference
[1] Kanwal, T., Anjum, A., & Khan, A. (2021). Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Cluster Computing, 24(1), 293-317.
[2] Wu, Y., Dai, H. N., Wang, H., & Choo, K. K. R. (2021). Blockchain-based privacy preservation for 5g-enabled drone communications. IEEE Network, 35(1), 50-56.
[3] Kumar, R., Kumar, P., Tripathi, R., Gupta, G. P., & Kumar, N. (2021). P2SF-IoV: A Privacy-Preservation-Based Secured Framework for Internet of Vehicles. IEEE Transactions on Intelligent Transportation Systems.
[4] Hu, C., Cheng, X., Tian, Z., Yu, J., & Lv, W. (2021). Achieving privacy preservation and billing via delayed information release. IEEE/ACM Transactions on Networking.
[5] Parvathaneni Rajendra Kumar, et al. "Heart Disease Prediction based on Ensemble Classification Model with Tuned Training Weights." International Journal of Engineering Trends and Technology, vol. 70, no. 4, Apr. 2022, pp. 59-81.
[6] Chen, Z., Zhu, T., Xiong, P., Wang, C., & Ren, W. (2021). Privacy preservation for image data: A GAN‐based method. International Journal of Intelligent Systems, 36(4), 1668-1685.
[7] Chen, F., Chen, X., Xiang, L., & Ren, W. (2021). Distributed economic dispatch via a predictive scheme: heterogeneous delays and privacy preservation. Automatica, 123, 109356.
[8] Nitesh Gaikwad, Dr. Shiyamala. S. Design and Development of Microarchitecture for Dynamic IoT Communication International Journal of Engineering Trends and Technology, 69(11), 1-8.
[9] Bansal, A., Chen, T., & Zhong, S. (2011). Privacy preserving back-propagation neural network learning over arbitrarily partitioned data. Neural Computing and Applications, 20(1), 143-150.
[10] Graepel, T., Lauter, K., & Naehrig, M. (2012, November). ML confidential: Machine learning on encrypted data. In International Conference on Information Security and Cryptology (pp. 1-21). Springer, Berlin, Heidelberg.
[11] Rahulamathavan, Y., Phan, R. C. W., Veluru, S., Cumanan, K., & Rajarajan, M. (2013). Privacy-preserving multi-class support vector machine for outsourcing the data classification in the cloud. IEEE Transactions on Dependable and Secure Computing, 11(5), 467-479.
[12] Raphael, B. O. S. T., Raluca, P., & Stephen, T. (2015). Machine learning classification over encrypted data. In Network and Distributed System Security Symposium. NDSS Symposium, San Diego.
[13] Wong, W. K., Cheung, D. W. L., Kao, B., & Mamoulis, N. (2009, June). Secure knn computation on encrypted databases. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of data (pp. 139-152).
[14] Aslett, L. J., Esperança, P. M., & Holmes, C. C. (2015). Encrypted statistical machine learning: new privacy preserving methods. arXiv preprint arXiv:1508.06845.
[15] Liu, X., Lu, R., Ma, J., Chen, L., & Qin, B. (2015). Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification. IEEE journal of biomedical and health informatics, 20(2), 655-668.
[16] Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., & Wernsing, J. (2016, June). Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International conference on machine learning (pp. 201-210). PMLR.
[17] Y.Krishna Bhargavi, Dr. Yelisetty Ssr Murthy, Dr.O.Srinivasa Rao "A Real And Accurate Semantic Search Indexing Approach Using Asvm Machine In Big Data Analytics" International Journal of Engineering Trends and Technology 69.2(2021):144-159.
[18] Li, X., Zhu, Y., Wang, J., Liu, Z., Liu, Y., & Zhang, M. (2017). On the soundness and security of privacy-preserving SVM for outsourcing data classification. IEEE Transactions on Dependable and Secure Computing, 15(5), 906-912.
[19] Aono, Y., Hayashi, T., Wang, L., & Moriai, S. (2017). Privacy-preserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security, 13(5), 1333-1345.
[20] Kim, M., Song, Y., Wang, S., Xia, Y., & Jiang, X. (2018). Secure logistic regression based on homomorphic encryption: Design and evaluation. JMIR medical informatics, 6(2), e8805.
[21] Liu, X., Choo, K. K. R., Deng, R. H., Lu, R., & Weng, J. (2016). Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Transactions on Dependable and Secure Computing, 15(1), 27-39.
[22] Sun, X., Zhang, P., Liu, J. K., Yu, J., & Xie, W. (2018). Private machine learning classification based on fully homomorphic encryption. IEEE Transactions on Emerging Topics in Computing, 8(2), 352-364.
[23] Maheshwari, V., Mahmood, M. R., Sravanthi, S., Arivazhagan, N., ParimalaGandhi, A., Srihari, K., ... & Sundramurthy, V. P. (2021). Nanotechnology-Based Sensitive Biosensors for COVID-19 Prediction Using Fuzzy Logic Control. Journal of Nanomaterials, 2021.
[24] Khadidos, A., Khadidos, A. O., Kannan, S., Natarajan, Y., Mohanty, S. N., & Tsaramirsis, G. (2020). Analysis of COVID-19 Infections on a CT Image Using DeepSense Model. Frontiers in Public Health, 8.
[25] Raja, R. A., Karthikeyan, T., & Kousik, N. V. (2020). Improved Privacy Preservation Framework for Cloud-Based Internet of Things. In Internet of Things (pp. 165-174). CRC Press.
[26] Baryalai, M., Jang-Jaccard, J., & Liu, D. (2016, December). Towards privacy-preserving classification in neural networks. In 2016 14th annual conference on privacy, security and trust (PST) (pp. 392-399). IEEE.