Medical Data Classification in Cloud Computing Using Soft Computing With Voting Classifier: A Review
Saurabh Sharma
Dept. of CSE, Amity School of Engineering & Technology, Amity University (M.P.), Gwalior, India
Search for more papers by this authorHarish K. Shakya
Dept. of CSE, Amity School of Engineering & Technology, Amity University (M.P.), Gwalior, India
Search for more papers by this authorAshish Mishra
Department of CSE, Gyan Ganga Institute of Technology and Sciences, Jabalpur, India
Search for more papers by this authorSaurabh Sharma
Dept. of CSE, Amity School of Engineering & Technology, Amity University (M.P.), Gwalior, India
Search for more papers by this authorHarish K. Shakya
Dept. of CSE, Amity School of Engineering & Technology, Amity University (M.P.), Gwalior, India
Search for more papers by this authorAshish Mishra
Department of CSE, Gyan Ganga Institute of Technology and Sciences, Jabalpur, India
Search for more papers by this authorR.J. Hemalatha
Search for more papers by this authorD. Balaganesh
Search for more papers by this authorAnand Paul
Search for more papers by this authorSummary
In the current context, a tele-medical system is the rising medical service where health professionals can use telecommunication technology to treat, evaluate, and diagnose a patient. The data in the healthcare system signifies a set of medical data that is sophisticated and larger in number (X-ray, fMRI data, scans of the lungs, brain, etc.). It is impossible to use typical hardware and software to manage medical data collections. Therefore, a practical approach to the equilibrium of privacy protection and data exchange is required. To address these questions, several approaches are established, most of the studies focusing on only a tiny problem with a single notion. This review paper analyzes the data protection research carried out in cloud computing systems and also looks at the major difficulties that conventional solutions confront. This approach helps researchers to better address existing issues in protecting the privacy of medical data in the cloud system.
References
- Smith , Rawat , P.S., Saroha , G.P. , Bartwal , V. , Evaluating SaaSModeler (small mega) Running on the Virtual Cloud Computing Environment using CloudSim . Int. J. Comput. Appl. (0975–8887), 5 , 13, 2012c of September. London, A247, 529 – 551 , April 1955 .
- Whitney , A. and Dwyer , II , S.J. , the performance and implementation of the K-nearest neibbor decision rule with no training samples correctly identified, in: Proc. 4 Ann. Allerton Conf. On the Circuit System Band Theory, 1966 .
- Dasarathy , B.V. , Nosing aroung the environment: A new structure and a system of classification rules for recognition in the most affected . IEEE Trans. Pattern Anal. Mach. Intell. , PAMI- 2 , 67 – 71 , 1980 .
-
Keller , J.M.
,
Gray , M.R.
,
Givens , Jr , J.A.
,
A Fussy-K-Nearest Neighbor algorithm
.
IEEE Trans. Syst. Man Cybern., SMC-15
,
4
,
580
–
585
, July/August
1985
.
10.1109/TSMC.1985.6313426 Google Scholar
- Bauer , E. and Kohavi , R. , A comparison of voting classification algorithms impirical: Bagging , Improve and variants. Mach. Learn. , 36 . 1 , 36105 – 139 , 1999 .
- Khan , M. , Ding , Q. , Perrizo , W. , K-Nearest Neighbor Classification on Spatial Data Streams Using P-Trees1 , 2. PAKDD 2002 LNAI, vol. 2336, pp. 517–528, 2002.
- Catteddu , D. and Hogben , G. , Cloud Computing: Benefits, risks and recommendations for information security , ENISA , Berlin, Heidelberg , 2009 .
- Phyu , T.N. , Survey on Data Mining Classification Techniques . Proceedings of the International MultiConference of Engineers and Computer Scientists 2009 , March 18– 2009 , vol. I, IMECS, 2009.
-
Ram , C.P.
and
Sreenivaasan , G.
,
Security as a Service (SASS): Securing of user data by the coprocessor and distributing data
.
Trendz Information and Computing Sciences (TISC2010)
,
December
2010
, pp.
152
-
155
.
10.1109/TISC.2010.5714628 Google Scholar
- Yau , S.S. and Ho , G. , Privacy protection in cloud computing sytems . Int. J. Software Inform. , 4 , 4 , 351 – 365 , December 2010 .
- Mishra , A. , An Authentication Mechanism Based on Client-Server Architecture for Accessing Cloud Computing , International Journal of Emerging Technology Advanced Engineering , 2 , 7 , 95 – 99 , July 2012 .
- Huang , S.-C. and Chen , B.-H. , Highly accurate moving object detection in variable bit rate video-based traffic monitoring systems . IEEE Transactions on Neural Networks and Learning Systems , 24 . 12 , 1920 – 1931 , 2013 .
- Kafhali , S.E. and Haqiq , A. , Effect of Mobility and Traffic Models on the energy consumption in MANET Routing Protocols. arXiv preprint arXiv:1304.3259, 2013 .
- Mishra , A. et al., A Review on DDOS Attack, TCP Flood Attack in Cloud Environment. Elsevier SSRN International Conference on Intelligent Communication and computation Research, Available at https://ssrn.com/abstract=3565043 , March 31, 2020 .