Fig. 1From: Big healthcare data: preserving security and privacyBig data security life cycle in healthcareBack to article page