alexa Abstract | Efficient Privacy Preservation Techniques for Maintaining HealthCare Records Using Big Data
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access


Efficient privacy preservation technique for health records is have been directed to big data processing for its high volume ,velocity challenges.Two level encryption is performed where cloud provider maintains first level encryption and second level encryption is controlled by patient server.we are using doubleencryption level to maintain the privacy of the patient in which the records are maintained in two tables it makes the privacy even more enhanced. We are using two algorithms which are linear congruential generator and Triple DES Algorithm. Linear congruential generator is done in the first level encryption which provides the encryption key. For index level table we use same key encryption which makes searching very easy. The index table consist of the basic information about the patient such as name, ssn no, age (i.e it consist the user searchable keywords).Big Data are now rapidly expanding in all science and engineering domains, including biological and biomedical sciences. In this re-identification is performed in which if the information is same, it will be stored in the buffer and the re-identification page will be opened in which the unique identification will be verified. If it is not the same it will be showed after the authentication is performed. The authentication will be performed based on some criteria. Once the authentication is matched the, a privacy key will be generated only then it will be able to taken from the database and it will bedecrypted and will be shown to the requestor.

To read the full article Peer-reviewed Article PDF image

Author(s): S.Jegadeesan, S.Pooja, Vidhya.T


Linear Congruential Generator, Triple DES Algorithm, Two Level Encryption, Authentication,Security. , Speech Therapy for Adults,Speech and Language pathology,Bilingual Speech pathology,Speech and Language Disorders.

Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version