Abstract

The ever-increasing integration of highly diverse enabled data generating technologies in medical, biomedical and healthcare fields and the growing availability of data at the central location that can be used in need of any organization from pharmaceutical manufacturers to health insurance companies to hospitals have primarily make healthcare organizations and all its sub-sectors in face of a flood of big data as never before experienced. Biomedical research often involves studying patient data that contain personal information. Wrong utilization of these information may prompt spillage of touchy data, which can put tolerant protection in danger. The issue of protecting patient security has gotten expanding considerations in the period of enormous information. Numerous security strategies have been created to ensure against different assault models. This paper audits applicable subjects with regards to biomedical research. We talk about protection saving advancements identified with (1) recordlinkage, (2) engineered information age, and (3) genomic information security. We additionally examine the moral ramifications of huge information protection in biomedicine and present difficulties in future research bearings for enhancing information security in biomedical research. Enormous information investigation empowers look into associations to break down a blend of organized and unstructured information for recognizing important therapeutic data and bits of knowledge in social insurance related biomedical innovative work.

Authors and Affiliations

K. Sumdeepthi| Lecturer, Dept. of Computer Science, Maris Stella College, Vijayawada, A.P., India

Keywords

Related Articles

A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice

DDoS attacks usually take up early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks throug...

Enhance the data alignment results using multiple annotators

The Internet presents a huge amount of useful information which is usually formatted for its users.The information which is extracted from different databases it is also called as Web database.In online shopping our...

Power Quality Improvement In Distribution Systems Using Facts Devices

The quality of available supply power has a direct economic impact on industrial and domestic sectors which affects the growth of any nation.This paper proposes an algorithm to produce reference voltage for a distrib...

Dynamic Performance Analysis of BLDC Motor with Adaptive Neuro Fuzzy Controller Under Critical Load Condition

Brushless DC (BLDC) motors have been widely used in many fields of drives for their high power/weight, high torque, high efficiency, long operating life, noiseless operation, high speed ranges and ease of control. In...

A Deniable Cp-Abe Scheme For An Audit-Free Cloud Storage Service

To brawl against outside coercion, we meant to build an encryption scheme that could help cloud storage providers keep away from this quandary. In our move toward, we present cloud storage providers means to create f...

Download PDF file
  • EP ID EP17039
  • DOI -
  • Views 312
  • Downloads 4

How To Cite

K. Sumdeepthi (2017). . International Journal of Science Engineering and Advance Technology, 5(10), 1000-1003. https://europub.co.uk/articles/-A-17039