Big Data confidentiality in Healthcare

Authors:

S. Amudha,K. AnitaDavamani,

DOI NO:

https://doi.org/10.26782/jmcms.spl.2019.08.00002

Keywords:

Moroccan setting,massive Data,

Abstract

We exist these days in an overall release, anywhere protection is not really kept up, with the huge information getting included, it's just deteriorating, since information is from this time forward all over and about everybody, we can't generally educate who recognizes what concerning who, where the information is really depending, and what utilizes are through not in of it. Security however a vital angle that individuals dependably require in numerous areas, and it's not less vital in the human services diligence, where data just gets much progressively close to home and touchy that any protection rupture turns into an issue of last chance. In this paper, we have focused on the benefits of giant data within the healthful services phase, even as a little of the principle challenges frequently intimate with. We’ve then centered on the Moroccan setting, incontestable the problems it's and its specificities, thus on propose proposals to urge the leaders to require the approach of massive Data. Lastly, we've enlightened the safety problems in healthful services and also the gift ways won’t to guarantee the patient's protection.

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April-June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology,
Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of highpower hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016
X. P. Zahradnik, “Equiripple Approximation of Low-pass FIR Filters Equiripple Approximation of Low-pass FIR Filters”,IEEE Transactions on Circuits and Systems II: Express Briefs, Issue: 99,pp. 1-5, 2017
XI. P. Zhao, J. McNeely, P. Golconda, M. A. Bayoumi, R. A. Barcenas, W. Kuang, ” Low-Power Clock Branch Sharing Double-Edge Triggered Flip- Flop”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.: 15, Issue: 3,pp: 338 – 345, 2007

View | Download