{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:31:40Z","timestamp":1774967500912,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T00:00:00Z","timestamp":1679356800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T00:00:00Z","timestamp":1679356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The worldwide usage of Internet of Things (IoT) applications enhanced the utilization of consumer devices, such as smartphones, computers, screening equipment used in hospitals that merely rely on imaging techniques. Numerous images got generated over the cloud platform in a daily basis ad create storage complexity. On the other hand, securing the data stored in the cloud is important. Instead of storing large amount of data into the cloud, lightweight dynamic processing of data suppresses the complex issues in cloud security. Here secure cloud-based image processing architecture is discussed. Privacy preserving medical data communication is considered as the specific research scope. Cryptographic technique used to encode the original data and decode the data at the other end is currently in usage as conventional design. Providing privacy to the medical records through adding noise and denoising the same records is the proposed idea. The proposed work is keenly focused on creating a light weight cloud architecture that communicates the medical data effectively with privacy perseverance using deep learning technique. In the proposed system, the design of an efficient image denoising scheme with a hybrid classification model is created to ensure reliable and secure communication. Deep learning algorithms merged to form a Pseudo-Predictive Deep Denoising Network (PPDD). The proposed system's benefit is ensuring added security in Dark Cloud using a newly structured algorithm. The original data is packed in the Deep cloud using the Gaussian noise act as a key. The complete packing and unpacking of medical data is encapsulated by the transformed images. Over the cloud premise, the data is highly secured and invisible to the malicious users. To reduce the storage complexity, the dynamic data is unpacked and denoise process is applied at the edge devices. During the authorized access period alone, the data is decrypted and accessible at the edge nodes. The maximum process is dynamically happen in the cloud without depending on the storage boundary. The performance of proposed PPDD network model is evaluated through Signal to noise ratio (SNR), Similarity index (SI),Error Rate(ER) and Contrast to noise ratio(CNR). The proposed architecture is comparatively validated with existing state-of-art approach.<\/jats:p>","DOI":"10.1186\/s13677-023-00422-w","type":"journal-article","created":{"date-parts":[[2023,3,26]],"date-time":"2023-03-26T21:05:22Z","timestamp":1679864722000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Securing medical image privacy in cloud using deep learning network"],"prefix":"10.1186","volume":"12","author":[{"given":"Gayathri","family":"S","sequence":"first","affiliation":[]},{"given":"Gowri","family":"S","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,21]]},"reference":[{"issue":"08","key":"422_CR1","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TKDE.2010.247","volume":"23","author":"G Wang","year":"2011","unstructured":"Wang G, Gehrke J, Xiao X (2011) Differential Privacy via Wavelet Transforms. IEEE Transactions on Knowledge Data Engineering 23(08):1200\u20131214. https:\/\/doi.org\/10.1109\/TKDE.2010.247","journal-title":"IEEE Transactions on Knowledge Data Engineering"},{"issue":"6","key":"422_CR2","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TMC.2019.2908638","volume":"19","author":"J Ni","year":"2020","unstructured":"Ni J, Zhang K, Xia Q, Lin X, Shen XS (2020) Enabling strong privacy preservation and accurate task allocation for mobile Crowdsensing. IEEE Trans Mob Comput 19(6):1317\u20131331. https:\/\/doi.org\/10.1109\/TMC.2019.2908638","journal-title":"IEEE Trans Mob Comput"},{"issue":"3","key":"422_CR3","doi-asserted-by":"publisher","first-page":"801","DOI":"10.2298\/CSIS100327029R","volume":"8","author":"H Ruwei","year":"2011","unstructured":"Ruwei H, Xiaolin G, Si Y, Wei Z (2011) Study of privacy-preserving framework for cloud storage. Comput Sci Inf Syst 8(3):801\u2013819","journal-title":"Comput Sci Inf Syst"},{"key":"422_CR4","unstructured":"Sahu HK, Verma RK, Sahu SK. Fuzzy logic based soft filters for removing noise and preserving edge. Int J Eng Res Tech. (IJERT) ISNCESR. 2015;3(20)"},{"issue":"3","key":"422_CR5","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1109\/TDSC.2019.2907081","volume":"18","author":"Y Zheng","year":"2021","unstructured":"Zheng Y, Duan H, Tang X, Wang C, Zhou J (2021) Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising. IEEE Trans Dependable Secure Comput 18(3):1261\u20131275. https:\/\/doi.org\/10.1109\/TDSC.2019.2907081","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"422_CR6","first-page":"179","volume-title":"Proc. International Conference on Cloud, Big Data and Trust, 2013, Nov 13\u201315, RGPV","author":"VK Saxena","year":"2013","unstructured":"Saxena VK, Pushkar S (2013) Anonymization approach for privacy preserving in cloud computing. Proc. International Conference on Cloud, Big Data and Trust, 2013, Nov 13\u201315, RGPV. pp 179\u201382"},{"key":"422_CR7","doi-asserted-by":"publisher","first-page":"114940","DOI":"10.1109\/ACCESS.2020.3003928","volume":"8","author":"JS Li","year":"2020","unstructured":"Li JS, Liu IH, Tsai CJ, Su ZY, Li CF, Liu CG (2020) Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality. IEEE Access 8:114940\u2013114952. https:\/\/doi.org\/10.1109\/ACCESS.2020.3003928","journal-title":"IEEE Access"},{"key":"422_CR8","doi-asserted-by":"crossref","unstructured":"Wang T, Zheng Z, Rehmani MH, Yao S, Huo Z. Privacy Preservation in Big Data From the Communication Perspective\u2014A Survey. IEEE Communications Surveys & Tutorials. ;21(1)","DOI":"10.1109\/COMST.2018.2865107"},{"issue":"3","key":"422_CR9","doi-asserted-by":"publisher","first-page":"4921","DOI":"10.1109\/JIOT.2019.2893866","volume":"6","author":"F Samie","year":"2019","unstructured":"Samie F, Bauer L, Henkel J (2019) From cloud down to things: an overview of machine learning in internet of things. IEEE Internet Things J 6(3):4921\u20134934. https:\/\/doi.org\/10.1109\/JIOT.2019.2893866","journal-title":"IEEE Internet Things J"},{"issue":"13","key":"422_CR10","doi-asserted-by":"publisher","first-page":"2780","DOI":"10.1007\/s00259-019-04468-4","volume":"46","author":"J Cui","year":"2019","unstructured":"Cui J, Gong K, Guo N, Wu C, Meng X, Kim K, Zheng K, Wu Z, Fu L, Xu B, Zhu Z, Tian J, Liu H, Li Q (2019) PET image denoising using unsupervised deep learning. Eur J Nucl Med Mol Imaging 46(13):2780\u20132789. https:\/\/doi.org\/10.1007\/s00259-019-04468-4","journal-title":"Eur J Nucl Med Mol Imaging"},{"key":"422_CR11","first-page":"6272","volume-title":"Euro-Par 2014 Workshops, Part II, LNCS 8806","author":"M Dawoud","year":"2014","unstructured":"Dawoud M, Turgay Altilar D (2014) Privacy-preserving search in data clouds using normalized homomorphic encryption. In: Lopes L et al (eds) Euro-Par 2014 Workshops, Part II, LNCS 8806. Springer, Switzerland, p 6272"},{"issue":"2","key":"422_CR12","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/TIFS.2012.2235831","volume":"8","author":"LA Dunning","year":"2013","unstructured":"Dunning LA, Kresman R (2013) Privacy preserving data sharing with anonymous id assignment. IEEE Trans Inf Forens Security 8(2):402","journal-title":"IEEE Trans Inf Forens Security"},{"key":"422_CR13","first-page":"561","volume-title":"Bioinformatics, Computational Biology and Biomedicine: Proc. the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics, BCB'13, September 22 \u2013 25, 2013, Washington, DC, USA","author":"S Guo","year":"2013","unstructured":"Guo S, Zhong S, Zhang A (2013) A privacy preserving Markov model for sequence classification. Bioinformatics, Computational Biology and Biomedicine: Proc. the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics, BCB\u201913, September 22 \u2013 25, 2013, Washington, DC, USA. ACM, New York, pp 561\u201368"},{"key":"422_CR14","first-page":"83","volume-title":"Proc. IEEE 10th International confere.nce on Trust, Security and Privacy in Computing and Communications: TrustCom, 16- 18 Nov. 2011","author":"M Zhou","year":"2011","unstructured":"Zhou M et al (2011) A privacy-preserved access control for cloud computing. Proc. IEEE 10th International confere.nce on Trust, Security and Privacy in Computing and Communications: TrustCom, 16- 18 Nov. 2011. IEEE, Changsha, pp 83\u201390"},{"key":"422_CR15","first-page":"112116","volume-title":"100 Great Problems of Elementary Mathematics: Their History and Solutions","author":"H Darrie","year":"1965","unstructured":"Darrie H (1965) Sturms problem of the number of roots. 100 Great Problems of Elementary Mathematics: Their History and Solutions. Dover, New York, p 112116"},{"key":"422_CR16","unstructured":"Lin P, Candan KS, Access-private outsourcing of Markov chain and random walk based data analysis applications, in Proc. 22nd International Conference on Data Engineering Workshops (ICDEW06)"},{"issue":"2","key":"422_CR17","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/JIOT.2017.2720635","volume":"5","author":"W Li","year":"2018","unstructured":"Li W, Song H, Zeng F (2018) Policy-based secure and trustworthy sensing for internet of things in smart cities. IEEE Internet Things J 5(2):716\u2013723. https:\/\/doi.org\/10.1109\/JIOT.2017.2720635","journal-title":"IEEE Internet Things J"},{"key":"422_CR18","first-page":"3205","volume-title":"2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)","author":"P Saini","year":"2016","unstructured":"Saini P, Singh H, Iain S, Soni S (2016) Image retrieval in cloud computing environment with the help of fuzzy semantic relevance matrix. 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). pp 3205\u2013210"},{"key":"422_CR19","doi-asserted-by":"publisher","unstructured":"Ma J, Peng C, Tian X, Jiang J (2012) DBDnet: a deep boosting strategy for image denoising. IEEE Trans Multimedia 24:3157\u20133168. https:\/\/doi.org\/10.1109\/TMM.2021.3094058","DOI":"10.1109\/TMM.2021.3094058"},{"key":"422_CR20","first-page":"32","volume-title":"Reduction of Salt-and-Pepper Noise from Digital Grayscale Image by Using Recursive Switching Adaptive Median Filter. Symposium on Intelligent Manufacturing Mechatronics","author":"H Ibrahim","year":"2019","unstructured":"Ibrahim H (2019) Reduction of Salt-and-Pepper Noise from Digital Grayscale Image by Using Recursive Switching Adaptive Median Filter. Symposium on Intelligent Manufacturing Mechatronics. Springer, Singapore, pp 32\u201347"},{"issue":"9","key":"422_CR21","doi-asserted-by":"publisher","first-page":"12043","DOI":"10.1007\/s11042-018-6732-8","volume":"78","author":"B Fu","year":"2019","unstructured":"Fu B, Zhao X, Song C, Li X, Wang X (2019) A salt and pepper noise image denoising method based on the generative classification. Multimedia Tools and Applications 78(9):12043\u201312053","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"422_CR22","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1002\/2017JB015019","volume":"123","author":"C Zhang","year":"2018","unstructured":"Zhang C, Yao H, Liu Q, Zhang P, Yuan YO, Feng J, Fang L (2018) Linear array ambient noise adjoint tomography reveals intense crust-mantle interactions in North China Craton. J Geophys Res Solid Earth 123(1):368\u2013383","journal-title":"J Geophys Res Solid Earth"},{"key":"422_CR23","doi-asserted-by":"crossref","unstructured":"Thakur D, Singh S, Mittal N, Singh H, Oliva D, Demin A. Nature and biologically inspired image segmentation techniques. Archives of Computational Methods in Engineering. 2021;1\u201328.","DOI":"10.1007\/s11831-021-09619-1"},{"key":"422_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TGRS.2021.3054071","volume":"60","author":"A Othman","year":"2021","unstructured":"Othman A, Iqbal N, Hanafy SM, Waheed UB (2021) Automated event detection and denoising method for passive seismic data using residual deep convolutional neural networks. IEEE Trans Geosci Remote Sens 60:1\u201311","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"422_CR25","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1109\/ALLERTON.2015.7447103","volume-title":"Privacy-preserving deep learning, 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","author":"R Shokri","year":"2015","unstructured":"Shokri R, Shmatikov V (2015) Privacy-preserving deep learning, 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton). pp 909\u201310. https:\/\/doi.org\/10.1109\/ALLERTON.2015.7447103"},{"issue":"1","key":"422_CR26","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/COMST.2018.2865107","volume":"21","author":"T Wang","year":"2019","unstructured":"Wang T, Zheng Z, Rehmani MH, Yao S, Huo Z (2019) Privacy preservation in big data from the communication perspective\u2014a survey. IEEE Commun Surv Tutorials 21(1):753\u2013778. https:\/\/doi.org\/10.1109\/COMST.2018.2865107. Firstquarter 2019","journal-title":"IEEE Commun Surv Tutorials"},{"key":"422_CR27","doi-asserted-by":"publisher","first-page":"136704","DOI":"10.1109\/ACCESS.2019.2943153","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang Y, Zhang A, Zhang P, Wang H (2019) Cloud-assisted EHR sharing with security and privacy preservation via consortium Blockchain. IEEE Access 7:136704\u2013136719. https:\/\/doi.org\/10.1109\/ACCESS.2019.2943153","journal-title":"IEEE Access"},{"key":"422_CR28","doi-asserted-by":"publisher","first-page":"212888","DOI":"10.1109\/ACCESS.2020.3039981","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang X, Wang M, Wang X, Chen G, Wang C (2020) Stateless cloud auditing scheme for non-manager dynamic group data with privacy preservation. IEEE Access 8:212888\u2013212903. https:\/\/doi.org\/10.1109\/ACCESS.2020.3039981","journal-title":"IEEE Access"},{"issue":"6","key":"422_CR29","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/TIFS.2017.2656824","volume":"12","author":"Y Zheng","year":"2017","unstructured":"Zheng Y, Cui H, Wang C, Zhou J (2017) Privacy-Preserving Image Denoising From External Cloud Databases. IEEE Trans Inf Forensics Secur 12(6):1285\u20131298. https:\/\/doi.org\/10.1109\/TIFS.2017.2656824","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00422-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00422-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00422-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,26]],"date-time":"2023-03-26T21:09:07Z","timestamp":1679864947000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00422-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,21]]},"references-count":29,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["422"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00422-w","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,21]]},"assertion":[{"value":"28 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"40"}}