Privacy Preservation of Sensitive Data using Polymorphic Encryption and Cryptographic Techniques
D. Asha Devi1, M. Suresh Babu.2, K. Bhavana Raj3
1D. Asha Devi, Professor, Department of ECE, Sreenidhi Institute of Science & Technology, Hyderabad (Telangana), India.
2M. Suresh Babu, Professor, Department of CSE, K.L. University of Campus Hyderabad (Telangana), India.
3K. Bhavana Raj, Assistant Professor, KLHBS, K.L. University of Campus Hyderabad, (Telangana), India.
Manuscript received on 07 October 2019 | Revised Manuscript received on 21 October 2019 | Manuscript Published on 26 December 2019 | PP: 433-440 | Volume-8 Issue-12S October 2019 | Retrieval Number: L110810812S19/2019©BEIESP | DOI: 10.35940/ijitee.L1108.10812S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The compilation and analysis of health records on a big data scale is becoming an essential approach to understand problematical diseases. In order to gain new insights it is important that researchers can cooperate: they will have to access each other’s data and contribute to the data sets. In many cases, such health records involves privacy sensitive data about patients. Patients should be cautious to count on preservation of their privacy and on secure storage of their data. Polymorphic encryption and Pseudonymisation, form a narrative approach for the management of sensitive information, especially in health care. The conventional encryptionsystem is rather inflexible: once scrambled, just one key can be utilized to unscramble the information. This inflexibility is turning into an each more noteworthy issue with regards to huge information examination, where various gatherings who wish to research some portion of an encoded informational index all need the one key for decoding. Polymorphic encryption is another cryptographic strategy that tackles these issues. Together with the related procedure of polymorphic pseudonymisation new security and protection assurances can be given which are fundamental in zones, for example, (customized) wellbeing area, medicinal information accumulation by means of self-estimation applications, and all the more by and large in protection inviting character the board and information examination. Encryption, pseudonymization and anonymization are some of the important techniques that facilitate the usders on security of sensitive data, and ensure compliance both from an Data Regulation act and any other information security act like Health Insurance Portability and Accountability Act – (HIPAA) regulations.
Keywords: Encryption, Cryptographic Technique, Anonymization, Pseudonymisation.
Scope of the Article: Encryption Methods and Tools