Abstract
This study aims to process the private medical data over eHealth cloud platform. The current pandemic situation, caused by Covid19 has made us to realize the importance of automatic remotely operated independent services, such as cloud. However, the cloud servers are developed and maintained by third parties, and may access user’s data for certain benefits. Considering these problems, we propose a specialized method such that the patient’s rights and changes in medical treatment can be preserved. The problem arising due to Melanoma skin cancer is carefully considered and a privacy-preserving cloud-based approach is proposed to achieve effective skin lesion segmentation. The work is accomplished by the development of a Z-score-based local color correction method to differentiate image pixels from ambiguity, resulting the segmentation quality to be highly improved. On the other hand, the privacy is assured by partially order homomorphic Permutation Ordered Binary (POB) number system and image permutation. Experiments are performed over publicly available images from the ISIC 2016 and 2017 challenges, as well as PH\(\) dataset, where the proposed approach is found to achieve significant results over the encrypted images (known as encrypted domain), as compared to the existing schemes in the plain domain (unencrypted images). We also compare the results with the winners of the ISBI 2016 and 2017 challenges, and show that the proposed approach achieves a very close result with them, even after processing test images in the encrypted domain. Security of the proposed approach is analyzed using a challenge-response game model.
- Rahena Akhter, Rownak Jahan Chowdhury, Keita Emura, Tamzida Islam, Mohammad Shahriar Rahman, and Nusrat Rubaiyat. 2013. Privacy-preserving two-party k-means clustering in malicious model. In Proceedings of the IEEE 37th Annual Computer Software and Applications Conference Workshops. 121–126. Google Scholar
Digital Library
- Siguang Chen, Xi Zhu, Haijun Zhang, Chuanxin Zhao, Geng Yang, and Kun Wang. 2020. Efficient privacy preserving data collection and computation offloading for fog-assisted IoT. IEEE Transactions on Sustainable Computing (2020).Google Scholar
Cross Ref
- Yi Chen, Shuai Ding, Zheng Xu, Handong Zheng, and Shanlin Yang. 2019. Blockchain-based medical records secure storage and medical service framework. Journal of Medical Systems 43, 1 (2019), 5. Google Scholar
Digital Library
- Can Eyupoglu, Muhammed Aydin, Abdul Zaim, and Ahmet Sertbas. 2018. An efficient big data anonymization algorithm based on chaos and perturbation techniques. Entropy 20, 5 (2018), 373.Google Scholar
Cross Ref
- Haidi Fan, Fengying Xie, Yang Li, Zhiguo Jiang, and Jie Liu. 2017. Automatic segmentation of dermoscopy images using saliency combined with Otsu threshold. Computers in Biology and Medicine 85 (2017), 75–85.Google Scholar
Cross Ref
- Zakaria Gheid and Yacine Challal. 2016. Efficient and privacy-preserving k-means clustering for big data mining. In Proceedings of the IEEE Trustcom/BigDataSE/ISPA. 791–798.Google Scholar
Cross Ref
- David Gutman, Celebi Emre Codella, Noel C. F. Marchetti, Michael Helba Brian, and Allan Halpern Mishra Nabin. 2016. Skin lesion analysis toward melanoma detection: A challenge at the International Symposium on Biomedical Imaging (ISBI) 2016, hosted by the International Skin Imaging Collaboration (ISIC). In [Online]. Available: https://arxiv.org/abs/1605.01397.Google Scholar
- Haiping Huang, Tianhe Gong, Ning Ye, Ruchuan Wang, and Yi Dou. 2017. Private and secured medical data transmission and analysis for wireless sensing healthcare system. IEEE Transactions on Industrial Informatics 13, 3 (2017), 1227–1237.Google Scholar
Cross Ref
- Mostafa Jahanifar, Neda Zamani Tajeddin, Babak Mohammadzadeh Asl, and Ali Gooya. 2019. Supervised saliency map driven segmentation of lesions in dermoscopic images. IEEE Journal of Biomedical and Health Informatics 23, 2 (2019), 509–518.Google Scholar
Cross Ref
- Hao Jin, Yan Luo, Peilong Li, and Jomol Mathew. 2019. A review of secure and privacy-preserving medical data sharing. IEEE Access 7 (2019), 61656–61669.Google Scholar
Cross Ref
- Xin Jin, Hongyu Zhang, Xiaodong Li, Haoyang Yu, Beisheng Liu, Shujiang Xie, Amit Kumar Singh, and Yujie Li. 2020. Confused modulo projection based somewhat homomorphic encryption-cryptosystem, library and applications on secure smart cities. IEEE Internet of Things Journal (2020).Google Scholar
- Pratik Kalshetti, Manas Bundele, Parag Rahangdale, Dinesh Jangra, Chiranjoy Chattopadhyay, Gaurav Harit, and Abhay Elhence. 2017. An interactive medical image segmentation framework using iterative refinement. Computers in Biology and Medicine 83 (2017), 22–33. Google Scholar
Digital Library
- R. Karakış, İ. Güler, İ. Çapraz, and E. Bilir. 2015. A novel fuzzy logic-based image steganography method to ensure medical data security. Computers in Biology and Medicine 67 (2015), 172–183. Google Scholar
Digital Library
- Santosh Kumar, Sanjay Kumar Singh, Amit Kumar Singh, Shrikant Tiwari, and Ravi Shankar Singh. 2018. Privacy preserving security using biometrics in cloud computing. Multimedia Tools and Applications 77, 9 (2018), 11017–11039. Google Scholar
Digital Library
- Ankita Lathey and Pradeep K. Atrey. 2015. Image enhancement in encrypted domain over cloud. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 11, 3 (2015), 38. Google Scholar
Digital Library
- David Megías and Amna Qureshi. 2017. Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting. Expert Systems with Applications 71 (2017), 147–172. Google Scholar
Digital Library
- Teresa Mendonça, Pedro M. Ferreira, Jorge S. Marques, André R. S. Marcal, and Jorge Rozeira. 2013. PH 2-A dermoscopic image database for research and benchmarking. In Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). 5437–5440.Google Scholar
- Manoranjan Mohanty, Muhammad Rizwan Asghar, and Giovanni Russello. 2016. \(\): Image scaling and cropping in encrypted domains. IEEE Transactions on Information Forensics and Security 11, 11 (2016), 2542–2555. Google Scholar
Digital Library
- Nathan Moroney. 2000. Local color correction using non-linear masking. In Proceedings of the Color and Imaging Conference. Society for Imaging Science and Technology, 108–111.Google Scholar
- Amitava Nag, Jyoti Prakash Singh, and Amit Kumar Singh. 2019. An efficient Boolean based multi-secret image sharing scheme. Multimedia Tools and Applications (2019), 1–25.Google Scholar
- J. Jesu Vedha Nayahi and V. Kavitha. 2017. Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop. Future Generation Computer Systems 74 (2017), 393–408.Google Scholar
Cross Ref
- Lina Ni, Chao Li, Xiao Wang, Honglu Jiang, and Jiguo Yu. 2018. DP-MCDBSCAN: Differential privacy preserving multi-core DBSCAN clustering for network user data. IEEE Access 6 (2018), 21053–21063.Google Scholar
Cross Ref
- Şaban Öztürk and Umut Özkaya. 2020. Skin lesion segmentation with improved convolutional neural network. Journal of Digital Imaging (2020).Google Scholar
- Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 223–238. Google Scholar
Digital Library
- Hongping Pang and Baocang Wang. 2020. Privacy-preserving association rule mining using homomorphic encryption in a multikey environment. IEEE Systems Journal (2020).Google Scholar
Cross Ref
- Sankita Patel, Sweta Garasia, and Devesh Jinwala. 2012. An efficient approach for privacy preserving distributed K-means clustering based on shamir’s secret sharing scheme. In Proceedings of the IFIP International Conference on Trust Management. Springer, 129–141.Google Scholar
Cross Ref
- A. J. Paverd, Andrew Martin, and Ian Brown. 2014. Modelling and automatically analysing privacy properties for honest-but-curious adversaries. University of Oxford, Tech. Rep (2014).Google Scholar
- Nikolaos Polatidis, Christos K. Georgiadis, Elias Pimenidis, and Haralambos Mouratidis. 2017. Privacy-preserving collaborative recommendations based on random perturbations. Expert Systems with Applications 71 (2017), 18–25. Google Scholar
Digital Library
- Amitesh Singh Rajput and Balasubramanian Raman. 2018. Cloud based image color transfer and storage in encrypted domain. Multimedia Tools and Applications 77, 16 (2018), 21509–21537. Google Scholar
Digital Library
- Aqeel Sahi, David Lai, and Yan Li. 2016. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Computers in Biology and Medicine 78 (2016), 1–8. Google Scholar
Digital Library
- Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612–613. Google Scholar
Digital Library
- Amit Kumar Singh. 2017. Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications 76, 6 (2017), 8881–8900. Google Scholar
Digital Library
- Priyanka Singh, Balasubramanian Raman, and Nishant Agarwal. 2018. Toward encrypted video tampering detection and localization based on POB number system over cloud. IEEE Transactions on Circuits and Systems for Video Technology 28(9), 9 (2018), 2116–2130.Google Scholar
Cross Ref
- A. Sreekumar and S. B. Sundar. 2009. An efficient secret sharing scheme for n out of n scheme using pob-number system. In Proc. Hack. 33.Google Scholar
- N. Z. Tajeddin and B. M. Asl. 2016. A general algorithm for automatic lesion segmentation in dermoscopy images. In Proceedings of the 23rd Iranian Conference on Biomedical Engineering. 134–139.Google Scholar
- Philipp Tschandl, Christoph Sinz, and Harald Kittler. 2019. Domain-specific classification-pretrained fully convolutional network encoders for skin lesion segmentation. Computers in Biology and Medicine 104 (2019), 111–116.Google Scholar
Cross Ref
- Kai Xing, Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, and Fengjuan Zhang. 2017. Mutual privacy preserving \(\)-means clustering in social participatory sensing. IEEE Transactions on Industrial Informatics 13, 4 (2017), 2066–2076.Google Scholar
Cross Ref
- Ji-Jiang Yang, Jian-Qiang Li, and Yu Niu. 2015. A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems 43 (2015), 74–86. Google Scholar
Digital Library
- L. Yu, H. Chen, Q. Dou, J. Qin, and P. Heng. 2017. Automated melanoma recognition in dermoscopy images via very deep residual networks. IEEE Transactions on Medical Imaging 36, 4 (2017), 994–1004.Google Scholar
Cross Ref
- Y. Yuan, M. Chao, and Y. Lo. 2017. Automatic skin lesion segmentation using deep fully convolutional networks with Jaccard distance. IEEE Transactions on Medical Imaging 36, 9 (2017), 1876–1886.Google Scholar
Cross Ref
- Yading Yuan and Yeh-Chi Lo. 2017. Improving dermoscopic image segmentation with enhanced convolutional-deconvolutional networks. IEEE Journal of Biomedical and Health Informatics (2017).Google Scholar
- Jiale Zhang, Yanchao Zhao, Jie Wu, and Bing Chen. 2020. LVPDA: A lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT. IEEE Internet of Things Journal 7, 5 (2020), 4016–4027.Google Scholar
Cross Ref
- Qingchen Zhang, Laurence T. Yang, Zhikui Chen, and Peng Li. 2017. PPHOPCM: Privacy-preserving high-order possibilistic c-means algorithm for big data clustering with cloud computing. IEEE Transactions on Big Data, doi=10.1109/TBDATA.2017.2701816 (2017).Google Scholar
- Xuyun Zhang, Laurence T. Yang, Chang Liu, and Jinjun Chen. 2014. A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud. IEEE Transactions on Parallel and Distributed Systems 25, 2 (2014), 363–373. Google Scholar
Digital Library
- Zhili Zhou, Yunlong Wang, Q. M. Jonathan Wu, Ching-Nung Yang, and Xingming Sun. 2016. Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security 12, 1 (2016), 48–63. Google Scholar
Digital Library
Index Terms
-Score-Based Secure Biomedical Model for Effective Skin Lesion Segmentation Over eHealth Cloud
Recommendations
Skin lesion extraction in dermoscopic images based on colour enhancement and iterative segmentation
ICIP'09: Proceedings of the 16th IEEE international conference on Image processingAccurate extraction of lesion borders is a crucial step in analysing dermoscopic skin lesion images. In this paper we present an effective approach to extracting lesion areas by combining an iterative segmentation algorithm with a preprocessing step ...
CP2EH: a comprehensive privacy-preserving e-health scheme over cloud
AbstractIn the Attribute-Based Encryption (ABE) scheme, patients encrypt their electronic health record (EHR), attach the appropriate attributes with it, and outsource them over the cloud. Doctors get the encrypted EHR corresponding to their area of ...
Automated brain tumour segmentation techniques- A review
Automatic segmentation of brain tumour is the process of separating abnormal tissues from normal tissues, such as white matter WM, gray matter GM, and cerebrospinal fluid CSF. The process of segmentation is still challenging due to the diversity of ...






Comments