Enhancing Security of Medical Image Data in the Cloud Using Machine Learning Technique

Full Text (PDF, 1105KB), PP.13-31

Views: 0 Downloads: 0

Author(s)

Chandra Shekhar Tiwari 1,* Vijay Kumar Jha 2

1. Department of Computer Science of Engg from Birla institute of Technology, Mesra, Ranchi (Jharkhand), India

2. BIT Mesra (Ranchi) Computer Science and Engg department

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2022.04.02

Received: 15 Dec. 2021 / Revised: 15 Feb. 2022 / Accepted: 2 Mar. 2022 / Published: 8 Aug. 2022

Index Terms

Arnoldcat mapping, Playfair ciphering, k-means, random forest, image encryption, image decryption, medical image security, security enhancements.

Abstract

To prevent medical data leakage to third parties, algorithm developers have enhanced and modified existing models and tightened the cloud security through complex processes. This research utilizes PlayFair and K-Means clustering algorithm as double-level encryption/ decryption technique with ArnoldCat maps towards securing the medical images in cloud. K-Means is used for segmenting images into pixels and auto-encoders to remove noise (de-noising); the Random Forest regressor, tree-method based ensemble model is used for classification. The study obtained CT scan-images as datasets from ‘Kaggle’ and classifies the images into ‘Non-Covid’ and ‘Covid’ categories. The software utilized is Jupyter-Notebook, in Python. PSNR with MSE evaluation metrics is done using Python. Through testing-and-training datasets, lower MSE score (‘0’) and higher PSNR score (60%) were obtained, stating that, the developed decryption/ encryption model is a good fit that enhances cloud security to preserve digital medical images.

Cite This Paper

Chandra Shekhar Tiwari, Vijay Kumar Jha, "Enhancing Security of Medical Image Data in the Cloud Using Machine Learning Technique", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.14, No.4, pp. 13-31, 2022. DOI:10.5815/ijigsp.2022.04.02

Reference

[1]He. C.G, Fan. X.M and Li. Y, (2013), “Toward ubiquitous healthcare services with a novel efficient cloud platform”, IEEE trans. Biomed Eng., 60(1), 230-234. 

[2]Hallett. Sh, Parr. G, McClean. S, McConnell. A and Majeed. B, “Cloud-based Healthcare: Towards a SLA Compliant Network Aware Solution for Medical Image Processing”, In Cloud Computing-2012: The 3rd International Conference on Cloud Computing, GRIDs, and Virtualization, 219-223.

[3]Mirarab. A, Fard. G. N and Shamsi. M, (2014), “A cloud solution for medical image processing”, Int. Journal of Engineering Research and Applications, 4(7.3), 74-82.

[4]Peng. C, and Jiangb. Z, (2011), “Building a Cloud Storage Service System”, 2nd Edition, 691-696.

[5]Arka. I.H and Chellappan. K, (2014), “Collaborative Compressed I-Cloud Medical Image Storage with Decompress Viewer”, Procedia – ScienceDirect, 42, 114-121.

[6]QingZang. H, Lei. Y, MingYuan. Y, FuLi. W and RongHua. L, (2011), “Medical Information Integration Based Cloud Computing,"Network Computing and Information Security (NCIS)”, 2011 International Conference on Cloud Computing-IEEE, 1, 79-83.

[7]Mahjoub. M, Mdhaffar. A, Halima. R.B and Jmaiel. M, (2011), “A Comparative Study of the Current Cloud Computing Technologies and Offers”, 1st International Symposium on Network Cloud Computing and Applications (NCCA), 131-134.

[8]Kumar. M, Aggarwal. A and Garg. A, (2014), “A review on various digital image encryption techniques and security criteria”, International Journal of Computer Applications (0975-8887), 96(13), 19-28.

[9]Prabha. R.J and Prabakaran. S, (2019), “Security in Cloud Health Care”, International Journal of Recent Technology and Engineering (IJRTE), 8(4), 6164-6171.

[10]Raval. D and Jangale. S, (2016), “Cloud based information security and privacy in healthcare”, International Journal of Computer Applications (0975-8887), 150(4), 11-15. 

[11]Shini .S.G, Thomas. T and Chithraranjan. K, (2012), “Cloud Based Medical Image Exchange-Security Challenges”, Procedia Engineering - SciVerse ScienceDirect, 38, 3454-3461.

[12]Ogbodo. I.A. and Bakpo. F.S, (2020), “Patient-Centric Cloud-Based EHR System for Government Hospitals in Developing Countries”, IOSR Journal of Computer Engineering (IOSR-JCE), 22(3.4): 53-61.

[13]Abbas. N. A-M, (2016), “Image encryption based on Independent Component Analysis and Arnold’s Cat Map”, Egyptian Informatics Journal, 17: 139-146.

[14]Thilagavathy. R and Murugan. A, (2018), “Cloud storage security scheme for image encryption using modified morse and zigzag pattern”, International Journal of Engineering and Technology, 7(4): 6290-6293.

[15]Ratna. A.A.P, Surya. F.T, Husna. D, Purnama. I.K.E, Nurtanio. I, et al., (2021), “Chaos-Based Image Encryption Using Arnold’s Cat Map Confusion and Henon Map Diffusion”, Advances in Science, Technology and Engineering Systems Journal, 6(1): 316-326.

[16]Kakkad, V, Patel. M and Shah. M, (2019), “Biometric authentication and image encryption for image security in cloud framework”, Multiscale and Multidisciplinary Modeling, Experiments and Design, 2: 233-248.

[17]Marwan. M, Kartit. A and Ouahmane. H, (2017), “A Cloud-based Framework to Secure Medical Image Processing”, Journal of Mobile Multimedia, 14(3), 319-344.

[18]Marwan. M, Kartit. A and Ouahmane. H, (2018), “Security Enhancement in Healthcare Cloud using Machine Learning”, Procedia - ScienceDirect, 127, 388-397.

[19]Parameswari. C.D and Shankar. K, (2019), “Medical Image Security - the State-of-the-Art”, International Journal of Recent Technology and Engineering (IJRTE), 8(4S2), 542-545.

[20]Al-Issa. Y, Ottom. M.A and Tamrawi. A, (2019), “eHealth Cloud Security Challenges: A Survey”, Hindawi -Journal of Healthcare Engineering, 7516035, 1-15.

[21]Marwan. M, AlShahwan. F, Sifou, F, Kartit. A and Ouahmane. H, (2019), “Improving the Security of Cloud-based Medical Image Storage”, Engineering Letters, 27(1), 1-19.

[22]Abdul-Majeed A.O, (2014), “Chaotic scheme for image encryption based on Arnold Cat’s map”, International Journal of Computer Science and Information Security, 12(3), 26-33.

[23]Hariyanto. E and Rahim. R, (2013), “Arnold’s Cat Map Algorithm in Digital Image Encryption”, International Journal of Science and Research (IJSR), 6(14), 1363-1365.

[24]Chowdhary. C.L, Patel. P.V, Kathrotia. K.J, et al., (2020), “Analytical Study of Hybrid Techniques for Image Encryption and Decryption”, Sensors, 20(5162), 1-18.

[25]Ye. R and Zhao. H, (2012), “An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps”, I. J. Computer Network and Information Security, 2012(7): 41-50.

[26]Khalil. M.I, (2017), “Medical Image Steganography: Study of Medical Image Quality Degradation when Embedding Data in the Frequency Domain”, I. J. Computer Network and Information Security, 2017(2): 22-28.

[27]Bhogal. R.S, Li. B, Gale. A and Chen. Y, (2018), “Medical Image Encryption using Chaotic Map Improved Advanced Encryption Standard”, I.J. Information Technology and Computer Science, 2018(8): 1-10.

[28]Mehrnahad. Z and Latif.A-M, (2019), “A Novel Image Encryption Scheme Based on Reversible Cellular Automata and Chaos”, I.J. Information Technology and Computer Science, 2019(11): 15-23.

[29]Augustyn. D. R, Wycislik. L and Sojka. M, (2021), “The Cloud-Enabled Architecture of the Clinical Data Repository in Poland”, Sustainability, 13(14050): 1-17.

[30]Datta. D, Mittal. D, Mathew. N. P and Sairabanu. J, (2020), “Comparison of performance of  parallel computation of CPU cores on CNN model”, In Proc. 2020 Int. Conf. on Emerging Trends in Information Technology and Engineering (ic-ETITE), Vellore, India, Piscataway: IEEE, 1-8.

[31]Liang. Z, Qin. Q, Zhou. C, Wang. N, Xu. Y and Zhou. W, (2021), “Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation”, PLoS ONE, 16(11-e0260014): 1-32.

[32]Sarosh. P, Parah. S. A and Bhat. G. M, (2021), “An efficient image encryption scheme for healthcare applications”, Multimedia Tools and Applications, 81:7253-7270.

[33]Sara. U, Akter. M and Uddin. M.S, (2019), “Image quality assessment through FSIM, SSIM, MSE and PSNR – A Comparative study”, Journal of Computer and Communications, 7(3), 8-18.

[34]Deshpande, R.G., Ragha, L.L. and Sharma, S.K, (2018) “Video Quality Assessment through PSNR Estimation for Different Compression Standards”, Indonesian Journal of Electrical Engineering and Computer Science, 11, 918-924.

[35]Markandey. A, Moghe. S, Bhute. Y and Honale. S, (2014), “An image encryption mechanism for data security in clouds”, In: 2014 IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS), pp: 227-231.

[36]Massod. F, Driss. M, Boulila. W, Ahmad. J, Rehman. S. U, et al., (2021), “A Lightweight Chaos‑Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations”, Wireless Personal Communications, Springer Publications, 10(07), 1-28.

[37]Hamad. S. H, Khalifa. A, Elhadad. A. A and Rida. S.Z., (2014), “A modified Playfair cipher for encrypting digital images”, Journal of Computers and Communication Engineering, 3(2): 1-9.