A Cloud-based Framework to Secure Medical Image Processing

Authors

  • Mbarek Marwan Chouaïb Doukkali University–El Jadida LTI Laboratory, TRI Department, ENSA Avenue Jabran Khalil Jabran, BP 299 El Jadida, Morocco
  • Ali Kartit Chouaïb Doukkali University–El Jadida LTI Laboratory, TRI Department, ENSA Avenue Jabran Khalil Jabran, BP 299 El Jadida, Morocco
  • Hassan Ouahmane Chouaïb Doukkali University–El Jadida LTI Laboratory, TRI Department, ENSA Avenue Jabran Khalil Jabran, BP 299 El Jadida, Morocco

Keywords:

Cloud computing, medical image processing, security, segmentation, genetic algorithms

Abstract

In the last few years, advanced software for processing medical images has gained a great interest in modern medicine. In fact, it provides valuable clinical information, and hence, can significantly improve diagnosis and treatment. Nevertheless, implementing these imaging tools often requires an important capital budget in both IT applications and hardware. This solution can unfortunately cause a dramatic increase in operational expenses and medical costs. To mitigate this problem, medical providers are shifting their interest onto using cloud computing, particularly the Software-as-a-Service (SaaS) model, instead of in-house data centres. In this case, healthcare professionals rely on remote applications delivered by an external provider to process patients’ digital records. Interestingly, in this paradigm, consumers are billed based on software utilization. Besides, cloud computing promises to offer a better Quality of Service (QoS), including availability, elasticity, trust, response time, security assurance, etc. Regardless of its significant financial benefits, the transition to the cloud environment gives rise to security and privacy problems, especially in the healthcare domain. Recently, various security measures and mechanisms have been suggested to overcome these challenges and accelerate the adoption of cloud computing services. In this regard, numerous cryptographic techniques are used to safely process digital medical images, techniques that make use of homomorphic cryptosystems, Secret Sharing Schemes (SSS), Service-Oriented Architecture (SOA) and Secure Multi-party Computation (SMC). Although these methods are deemed very promising, they can negatively impact the performance of cloud services. Most precisely, they are not yet mature enough to satisfy Service Level Agreement (SLA) constraints. The main contribution of this study consists of presenting a novel approach to secure cloud-based medical image processing. This proposed solution combines segmentation techniques and genetic algorithms together in one model. Based on this method, we rely on pixel intensity and entropy measurements to split an image into a number of regions to maintain data privacy. The principal reason for using genetic algorithms is to optimize the number of generated regions. Furthermore, we opt for an architecture based on multi-cloud systems and CloudSec module to enable distributed data processing and prevent accidental disclosure of medical information. As shown in the simulation results, the proposal is an appropriate framework for fuelling the integration of cloud applications in the healthcare sector. In particular, it enables clients to securely use remote image processing tools.

 

Downloads

Download data is not yet available.

References

Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., and Leaf,

D. (2011). NIST cloud computing reference architecture. NIST Special

Publication, 500(2011), 1–28.

Birje, M. N., Challagidad, P. S., Goudar, R. H., and Tapale, M. T. (2017).

Cloud computing review: concepts, technology, challenges and security.

International Journal of Cloud Computing, 6(1), 32–57.

Kumar, P. R., Raj, P. H., and Jelciana, P. (2017). Exploring Security Issues

and Solutions in Cloud Computing Services–A Survey. Cybernetics and

Information Technologies, 17(4), 3–31.

Noman, A., and Adams, C. (2013). Providing a data location assurance

service for cloud storage environments. Journal of Mobile Multimedia,

(4), 265–286.

Singh, A., and Chatterjee, K. (2017). Cloud security issues and challenges:

A survey. Journal of Network and Computer Applications, 79,

–115.

Radwan, T., Azer, M. A. and Abdelbaki, N. (2017). Cloud Computing

Security: challenges and future trends. International Journal of Computer

Applications in Technology, 55(2), 158 –172.

Kaur, K., Sharma, D. R., and Kahlon, D. R. (2017). Interoperability

and Portability Approaches in Inter-Connected Clouds: A Review. ACM

Computing Surveys (CSUR), 50(4), 49.

Tran, H. M., Ha, S. V. U., Dang, H. T., and Huynh, K. V. (2014).

Fault resolution system for inter-cloud environment. Journal of Mobile

Multimedia, 10(1&2), 16–29.

Shirazi, F., Seddighi, A., and Iqbal, A. (2017). Cloud Computing Security

and Privacy:AnEmpirical Study. In International Conference on Human-

Computer Interaction (pp. 534–549). Springer, Cham.

Kumar, P. R., Raj, P. H., and Jelciana, P. (2018). Exploring data security

issues and solutions in cloud computing. Procedia Computer Science,

, 691–697.

Yüksel, B., Küpçü, A., and Özkasap, Ö. (2017). Research issues for

privacy and security of electronic health services. Future Generation

Computer Systems, 68, 1–13.

Anjum, A., Malik, S. R, Choo, K. R., Khan, A., Haroon, A., Khan,

S., Khan, S. U., Ahmed, N. and Raza, B. (2018). An efficient privacy

mechanism for electronic health records. Computers & Security, 72,

–211.

Marwan, M., Kartit, A., and Ouahmane, H. (2018). A Framework

to Secure Medical Image Storage in Cloud Computing Environment.

Journal of Electronic Commerce in Organizations (JECO), 16(1), 1–16.

Shamir, A. (1979). How to share a secret. Communications of the ACM,

(11), 612–613.

Cheraghi, A. (2014). Sharing several secrets based on Lagrange’s interpolation

formula and Cipher feedback mode. International Journal of

Nonlinear Analysis and Applications, 5(2), 60–66.

Deepthi, S., Lakshmi,V. S., and Deepthi, P. P. (2017). Image processing in

encrypted domain for distributed storage in cloud. In International Conference

onWireless Communications, Signal Processing and Networking

(WiSPNET), (pp. 1478–1482). IEEE.

Lathey, A., and Atrey, P. K. (2015). Image enhancement in encrypted

domain over cloud. ACM Transactions on Multimedia Computing,

Communications, and Applications (TOMM), 11(3), 38.

Paillier, P. (1999). Public-key cryptosystems based on composite degree

residuosity classes. In International Conference on the Theory and Applications

of Cryptographic Techniques (pp. 223–238). Springer, Berlin,

Heidelberg.

Ziad, M. T. I., Alanwar, A., Alzantot, M., and Srivastava, M. (2016).

Cryptoimg: Privacy preserving processing over encrypted images. In

IEEE Conference on Communications and Network Security (CNS),

(pp. 570–575). IEEE.

Hu, X., Zhang, W., Li, K., Hu, H., and Yu, N. (2016). Secure nonlocal

denoising in outsourced images. ACM Transactions on Multimedia

Computing, Communications, and Applications (TOMM), 12(3), 40.

Vaida, M. F., Todica, V., and Cremene, M. (2008). Service oriented

architecture for medical image processing. International Journal of

Computer Assisted Radiology and Surgery, 3(3–4), 363–369.

Shen, C., Zhao, Y., and Chen, L. (2013). Galaxie: a P2P based EDSOA

platform for cloud services. In Proceedings Demo & Poster Track of

ACM/IFIP/USENIX International Middleware Conference (p. 9). ACM.

Sadeghi, A. R., Schneider, T., and Wehrenberg, I. (2009). Efficient

privacy-preserving face recognition. In International Conference on

Information Security and Cryptology (pp. 229–244). Springer, Berlin,

Heidelberg.

Avidan, S. and Butman, M. (2006). Efficient Methods for Privacy Preserving

Face Detection, in NIPS’06: the 19th International Conference

on Neural Information Processing Systems, (Canada, 2006), 57–64.

You, G., Hwang, S. and Jain, N. (2011). Scalable Load Balancing in

Cluster Storage Systems. in Kon F., Kermarrec AM. eds. Middleware

Lecture Notes in Computer Science, vol. 7049. Springer, Berlin,

Heidelberg, 101–122.

Wong, K.W. (2009). Image Encryption Using Chaotic Maps. in Kocarev

L., Galias Z., Lian S. eds. Intelligent Computing Based on Chaos. Studies

in Computational Intelligence, vol. 184. Springer, Berlin, Heidelberg,

–354.

Andre, P. (1999). Selectionist Relaxation: Genetic Algorithm Applied to

Image Segmentation. Image and Vision Computing, vol. 17, 175–187.

Goldberg, D. E. (1989). Genetic Algorithms in Search, Optimization and

Machine Learning. Addison-Wesley, Massachusetts, USA.

Yoshimura, M. and Oe, S. (1999). Evolutionary Segmentation of Texture

using Genetic Algorithms Towards Automatic Decision of Optimum

Number of Segmentation Areas. Pattern Recognition, 2041–2054.

Wu, Y., Noonan, J. P. and Agaian, S. (2011). NPCR and UACI Randomness

Tests for Image Encryption. Cyber Journals: Multidisciplinary

Journals in Science and Technology, Journal of Selected Areas in

Telecommunications (JSAT), 31–38.

Marwan, M., Kartit, A. and Ouahmane, H., Security in Cloud-Based

Medical Image Processing: requirements and approaches. in BDCA’17:

the 2nd International Conference on Big Data, Cloud and Applications

(BDCA’17). ACM, New York, NY, USA, Article 6, 6 pages.

Marwan, M., A. Kartit and Ouahmane, H. (2016). A Secure Framework

for Medical Image Storage Based on Multi-cloud. in Proceeding of

the International Conference on Cloud Computing Technologies and

Applications, CloudTech, 88–94.

Guo, S. and Zou, C. (2017). An Improved Image Retrieval Method

Based on Spark. in ICCSN: 9th IEEE International Conference on

Communication Software and Networks, (Guangzhou, China, 2017),

–1296.

Vemula, S. and Crick, C. (2015). Hadoop Image Processing Framework.

in Big Data Congress 2015, IEEE International Congress on Big Data,

(New York, NY, USA), 506–513.

Xia, Q., Sifah, E. B., Smahi, A.,Amofa, S., and Zhang, X. (2017). BBDS:

Blockchain-based data sharing for electronic medical records in cloud

environments. Information, 8(2), 44–59.

Zyskind, G., and Nathan, O. (2015). Decentralizing privacy: Using

blockchain to protect personal data. In IEEE Security and Privacy

Workshops (SPW), (pp. 180–184). IEEE.

Downloads

Published

2018-07-30

Issue

Section

Articles

Most read articles by the same author(s)