{"id":"https://openalex.org/W4406461077","doi":"https://doi.org/10.1109/bigdata62323.2024.10825560","title":"A Secure and Privacy-Preserving Framework for Healthcare Data Management Using Deterministic Additive Noise and Differential Privacy in Cloud Environments","display_name":"A Secure and Privacy-Preserving Framework for Healthcare Data Management Using Deterministic Additive Noise and Differential Privacy in Cloud Environments","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4406461077","doi":"https://doi.org/10.1109/bigdata62323.2024.10825560"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata62323.2024.10825560","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019122757","display_name":"Yousef Alsaud","orcid":null},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yousef Alsaud","raw_affiliation_strings":["Howard University,Department of Electrical Engineering and Computer Science,Washington, D.C.,USA"],"affiliations":[{"raw_affiliation_string":"Howard University,Department of Electrical Engineering and Computer Science,Washington, D.C.,USA","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046343080","display_name":"Danda B. Rawat","orcid":"https://orcid.org/0000-0003-3638-3464"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danda B Rawat","raw_affiliation_strings":["Howard University,Department of Electrical Engineering and Computer Science,Washington, D.C.,USA"],"affiliations":[{"raw_affiliation_string":"Howard University,Department of Electrical Engineering and Computer Science,Washington, D.C.,USA","institution_ids":["https://openalex.org/I137853757"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019122757"],"corresponding_institution_ids":["https://openalex.org/I137853757"],"apc_list":null,"apc_paid":null,"fwci":0.819,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83048287,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"4006","last_page":"4012"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8746892213821411},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7481572031974792},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6696847081184387},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5464982390403748},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5166559815406799},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.491792231798172},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48223814368247986},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.47779402136802673},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4573407471179962},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1748315393924713},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08614188432693481}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8746892213821411},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7481572031974792},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6696847081184387},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5464982390403748},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5166559815406799},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.491792231798172},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48223814368247986},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.47779402136802673},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4573407471179962},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1748315393924713},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08614188432693481},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata62323.2024.10825560","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2015580473","https://openalex.org/W2108282337","https://openalex.org/W2112855330","https://openalex.org/W2122622116","https://openalex.org/W2131900781","https://openalex.org/W2151934360","https://openalex.org/W2154158105","https://openalex.org/W2564914932","https://openalex.org/W2753299378","https://openalex.org/W2768332178","https://openalex.org/W2793149066","https://openalex.org/W2947730823","https://openalex.org/W2964305235","https://openalex.org/W3088187580","https://openalex.org/W3119097036","https://openalex.org/W3208226845","https://openalex.org/W3212495412","https://openalex.org/W4282547739","https://openalex.org/W4285063792","https://openalex.org/W4310054768","https://openalex.org/W4391847476","https://openalex.org/W6839975532"],"related_works":["https://openalex.org/W4315488958","https://openalex.org/W3176515490","https://openalex.org/W3185918024","https://openalex.org/W3138333794","https://openalex.org/W2773408865","https://openalex.org/W4226426276","https://openalex.org/W4391095118","https://openalex.org/W2083287929","https://openalex.org/W3132022922","https://openalex.org/W2613373864"],"abstract_inverted_index":{"The":[0,43,106],"rapid":[1],"adoption":[2],"of":[3,103,138],"cloud":[4,41,142],"storage":[5,62],"for":[6,48,116],"healthcare":[7,38,118,139],"data":[8,14,39,61,74,83,124,140],"brings":[9],"enhanced":[10],"accessibility":[11],"and":[12,22,35,63,101,120,126,135],"streamlined":[13],"management,":[15],"but":[16],"it":[17],"also":[18,108],"introduces":[19],"significant":[20],"security":[21],"privacy":[23,59,67,148],"challenges.":[24],"This":[25,128],"paper":[26],"presents":[27],"a":[28,90],"multi-layered":[29],"framework":[30,107],"designed":[31],"to":[32,57,71,95],"securely":[33],"manage":[34],"protect":[36],"sensitive":[37],"in":[40,141],"environments.":[42],"proposed":[44],"approach":[45,130],"leverages":[46],"encryption":[47],"securing":[49],"data,":[50],"combined":[51],"with":[52,146],"Deterministic":[53],"Additive":[54],"Noise":[55],"(DAN)":[56],"enhance":[58],"during":[60,75],"retrieval.":[64,127],"Additionally,":[65],"differential":[66],"mechanisms":[68],"are":[69],"employed":[70],"safeguard":[72],"patient":[73],"query":[76],"processing,":[77],"preventing":[78],"unauthorized":[79],"access":[80,125],"while":[81],"maintaining":[82],"utility.":[84],"Key":[85],"management":[86],"is":[87],"handled":[88],"via":[89],"Hardware":[91],"Security":[92],"Module":[93],"(HSM)":[94],"ensure":[96],"the":[97,132],"secure":[98,110,123],"generation,":[99],"storage,":[100],"usage":[102],"cryptographic":[104],"keys.":[105],"integrates":[109],"authentication":[111,115],"methods,":[112],"including":[113],"multi-factor":[114],"both":[117],"providers":[119],"patients,":[121],"enabling":[122],"comprehensive":[129],"strengthens":[131],"Confidentiality,":[133],"Integrity,":[134],"Availability":[136],"(CIA)":[137],"environments,":[143],"ensuring":[144],"compliance":[145],"stringent":[147],"regulations":[149],"such":[150],"as":[151],"HIPAA.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-05T09:29:38.588285","created_date":"2025-10-10T00:00:00"}
