Abstract
The study aims at discussing the security of medical data in the Internet era. By using k-anonymity (K-A) and differential privacy (DP), an algorithm model combining K-A and DP was proposed, which was simulated through the experiments. In the Magic and EIA datasets, the algorithm constructed was compared with K-A and the L-diversity model to verify the performance of the model. The model constructed based on DP had the lowest privacy-leakage risks, which increased with the number of identifiers in the Magic and EIA datasets, and the information disclosure was the least. In addition, in its usability analysis, it was found that its value was the most obviously improved and its operation efficiency was the highest. The K-A-DP algorithm can effectively reduce the risk of privacy leakage and information loss, and has achieved excellent results. Despite the deficiencies in the process of the experiment, the study still provides a reference for solving the problem of medical data security.
- S. Khozin, C. Weinstock, G. M. Blumenthal, et al. 2017. Osimertinib for the treatment of metastatic EGFR T790M mutation–positive non–small cell lung cancer. Clinical Cancer Research 23, 9 (2017), 2131–2135.Google Scholar
Cross Ref
- J. S. Smolen, M. C. Genovese, T. Takeuchi, et al. 2019. Safety profile of baricitinib in patients with active rheumatoid arthritis with over 2 years median time in treatment. Journal of Rheumatology 46, 1 (2019), 7–18.Google Scholar
Cross Ref
- E. E. K. Wallin, S. Mattsson, and E. M. G. Olsson. 2016. The preference for Internet-based psychological interventions by individuals without past or current use of mental health treatment delivered online: A survey study with mixed-methods analysis. JMIR Mental Health 3, 2 (2016), e25.Google Scholar
Cross Ref
- Y. I. N. Yuehong, Y. Zeng, X. Chen, et al. 2016. The Internet of Things in healthcare: An overview. Journal of Industrial Information Integration 1 (2016), 3–13.Google Scholar
Cross Ref
- J. Chen, F. Fan, J. Y. Wang, et al. 2017. The efficacy and safety of SGLT2 inhibitors for adjunctive treatment of type 1 diabetes: A systematic review and meta-analysis. Scientific Reports 7 (2017), 44128.Google Scholar
Cross Ref
- V. Mazzaferro, B. F. El-Rayes, M. D. dit Busset, et al. 2019. Derazantinib (ARQ 087) in advanced or inoperable FGFR2 gene fusion-positive intrahepatic cholangiocarcinoma. British Journal of Cancer 120, 2 (2019), 165.Google Scholar
Cross Ref
- C. Mathieu, P. Dandona, P. Gillard, et al. 2018. Efficacy and safety of dapagliflozin in patients with inadequately controlled type 1 diabetes (the DEPICT-2 study): 24-week results from a randomized controlled trial. Diabetes Care 41, 9 (2018), 1938–1946.Google Scholar
Cross Ref
- K. Ullah, M. A. Shah, and S. Zhang. 2016. Effective ways to use Internet of Things in the field of medical and smart health care. In Proceedings of the 2016 International Conference on Intelligent Systems Engineering (ICISE’16). IEEE, Los Alamitos, CA, 372–379.Google Scholar
- J. J. P. C. Rodrigues, D. B. D. R. Segundo, H. A. Junqueira, et al. 2018. Enabling technologies for the Internet of Health Things. IEEE Access 6 (2018), 13129–13141.Google Scholar
Cross Ref
- F. Chen, P. Deng, J. Wan, et al. 2015. Data mining for the Internet of Things: Literature review and challenges. International Journal of Distributed Sensor Networks 11, 8 (2015), 431047. Google Scholar
Digital Library
- D. Borthakur, H. Dubey, N. Constant, et al. 2017. Smart fog: Fog computing framework for unsupervised clustering analytics in wearable Internet of Things. In Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP’17). IEEE, Los Alamitos, CA, 472–476.Google Scholar
Cross Ref
- S. M. R. Islam, D. Kwak, M. D. H. Kabir, et al. 2015. The Internet of Things for health care: A comprehensive survey. IEEE Access 3 (2015), 678–708.Google Scholar
Cross Ref
- J. Jusak, H. Pratikno, and V. H. Putra. 2016. Internet of Medical Things for cardiac monitoring: Paving the way to 5G mobile networks. In Proceedings of the 2016 IEEE International Conference on Communication, Networks, and Satellite (COMNETSAT’16). IEEE, Los Alamitos, CA, 75–79.Google Scholar
- H. Fouad and H. Farouk. 2017. Heart rate sensor node analysis for designing Internet of Things telemedicine embedded system. Cogent Engineering 4, 1 (2017), 1306152.Google Scholar
Cross Ref
- C. F. Pasluosta, H. Gassner, J. Winkler, et al. 2015. An emerging era in the management of Parkinson's disease: Wearable technologies and the Internet of Things. IEEE Journal of Biomedical and Health Informatics 19, 6 (2015), 1873–1881.Google Scholar
Cross Ref
- M. Spiliopoulou and P. Papapetrou. 2019. Mining and model understanding on medical data. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, New York, NY, 3223–3224. Google Scholar
Digital Library
- G. N. Vilaza and J. E. Bardram. 2019. Sharing access to behavioural and personal health data: Designers’ perspectives on opportunities and barriers. In Proceedings of the 13th EAI International Conference on Pervasive Computing Technologies for Healthcare. ACM, New York, NY, 346–350. Google Scholar
Digital Library
- D. Borthakur, H. Dubey, N. Constant, et al. 2017. Smart fog: Fog computing framework for unsupervised clustering analytics in wearable Internet of Things. In Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP’17). IEEE, Los Alamitos, CA, 472–476.Google Scholar
Cross Ref
- J. Milgrom, B. G. Danaher, A. W. Gemmill, et al. 2016. Internet cognitive behavioral therapy for women with postnatal depression: A randomized controlled trial of MumMoodBooster. Journal of Medical Internet Research 18, 3 (2016), e54.Google Scholar
Cross Ref
- D. C. Mohr, K. N. Tomasino, E. G. Lattie, et al. 2017. IntelliCare: An eclectic, skills-based app suite for the treatment of depression and anxiety. Journal of Medical Internet Research 19, 1 (2017), e10.Google Scholar
Cross Ref
- M. Du, K. Wang, Y. Chen, et al. 2018. Big data privacy preserving in multi-access edge computing for heterogeneous internet of things. IEEE Communications Magazine 56, 8 (2018), 62–67. Google Scholar
Digital Library
- A. J. Walker, S. Wedam, L. Amiri-Kordestani, et al. 2016. FDA approval of palbociclib in combination with fulvestrant for the treatment of hormone receptor–positive, HER2-negative metastatic breast cancer. Clinical Cancer Research 22, 20 (2016), 4968–4972.Google Scholar
Cross Ref
- M. Ramachandran and V. Chang. 2016. Towards performance evaluation of cloud service providers for cloud data security. International Journal of Information Management 36, 4 (2016), 618–625. Google Scholar
Digital Library
- Q. I. Xia, E. B. Sifah, K. O. Asamoah, et al. 2017. MeDShare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5 (2017), 14757–14767.Google Scholar
Cross Ref
- C. Esposito, A. De Santis, G. Tortora, et al. 2018. Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Computing 5, 1 (2018), 31–37.Google Scholar
Cross Ref
- M. Kantarcioglu and E. Ferrari. 2019. Research challenges at the intersection of big data, security and privacy. Frontiers in Big Data 2, 1 (2019).Google Scholar
- R. Asija and R. Nallusamy. 2016. Healthcare SaaS based on a data model with built-in security and privacy. International Journal of Cloud Applications and Computing 6, 3 (2016), 1–14.Google Scholar
Cross Ref
- H. A. Al Hamid, S. M. M. Rahman, M. S. Hossain, et al. 2017. A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5 (2017), 22313–22328.Google Scholar
Cross Ref
- K. Abouelmehdi, A. Beni-Hessane, and H. Khaloufi. 2018. Big healthcare data: Preserving security and privacy. Journal of Big Data 5, 1 (2018), 1.Google Scholar
Cross Ref
- S. Pirbhulal, O. W. Samuel, W. Wu, et al. 2019. A joint resource-aware and medical data security framework for wearable healthcare systems. Future Generation Computer Systems 95 (2019), 382–391.Google Scholar
Digital Library
- X. Wan, H. Pei, M. Zhao, et al. 2016. Efficacy and safety of rAAV2-ND4 treatment for Leber's hereditary optic neuropathy. Scientific Reports 6 (2016), 21587.Google Scholar
Cross Ref
- C. H. Lee and H. J. Yoon. 2017. Medical big data: Promise and challenges. Kidney Research and Clinical Practice 36, 1 (2017), 3.Google Scholar
Cross Ref
- J. M. Llibre, C. C. Hung, C. Brinson, et al. 2018. Efficacy, safety, and tolerability of dolutegravir-rilpivirine for the maintenance of virological suppression in adults with HIV-1: Phase 3, randomised, non-inferiority SWORD-1 and SWORD-2 studies. Lancet 391, 10123 (2018), 839–849.Google Scholar
Cross Ref
- K. Singh, K. Drouin, L. P. Newmark, et al. 2016. Developing a framework for evaluating the patient engagement, quality, and safety of mobile health applications. Issue Brief (Commonw Fund) 5, 1 (2016), 11.Google Scholar
- E. Larkins, G. M. Blumenthal, H. Chen, et al. 2016. FDA approval: Alectinib for the treatment of metastatic, ALK-positive non–small cell lung cancer following crizotinib. Clinical Cancer Research 22, 21 (2016), 5171–5176.Google Scholar
Cross Ref
- M. Sinclair, B. M. Lagan, H. Dolk, et al. 2018. An assessment of pregnant women's knowledge and use of the Internet for medication safety information and purchase. Journal of Advanced Nursing 74, 1 (2018), 137–147.Google Scholar
Cross Ref
- M. Saborowski, M. Dölle, M. P. Manns, et al. 2018. Lipid-lowering therapy with PCSK9-inhibitors in the management of cardiovascular high-risk patients: Effectiveness, therapy adherence and safety in a real world cohort. Cardiology Journal 25, 1 (2018), 32–41.Google Scholar
Cross Ref
- D. Vashishtha, M. L. Mittal, and D. Werb. 2017. The North American opioid epidemic: Current challenges and a call for treatment as prevention. Harm Reduction Journal 14, 1 (2017), 7.Google Scholar
Cross Ref
- J. A. Gosling, P. Batterham, L. Ritterband, et al. 2018. Online insomnia treatment and the reduction of anxiety symptoms as a secondary outcome in a randomised controlled trial: The role of cognitive-behavioural factors. Australian & New Zealand Journal of Psychiatry 52, 12 (2018), 1183–1193.Google Scholar
Cross Ref
- S. M. Fung, C. Sud, and M. Suchodolski. 2019. Survey of customers requesting medical information: Preferences and information needs of patients and health care professionals to support treatment decisions. Therapeutic Innovation & Regulatory Science 6 (2019), 2168479018815455.Google Scholar
Cross Ref
- K. Gai, K. K. R. Choo, M. Qiu, et al. 2018. Privacy-preserving content-oriented wireless communication in Internet-of-Things. IEEE Internet of Things Journal 5, 4 (2018), 3059–3067.Google Scholar
Cross Ref
- J. Lin, W. Yu, N. Zhang, et al. 2017. A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal 4, 5 (2017), 1125–1142.Google Scholar
Cross Ref
- J. J. P. C. Rodrigues, D. B. D. R. Segundo, H. A. Junqueira, et al. 2018. Enabling technologies for the Internet of Health Things. IEEE Access 6 (2018), 13129–13141.Google Scholar
Cross Ref
- Y. Yang, L. Wu, G. Yin, et al. 2017. A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal 4, 5 (2017), 1250–1258.Google Scholar
Cross Ref
- E. Bertino, K. K. R. Choo, D. Georgakopolous, et al. 2016. Internet of things (IoT): Smart and secure service delivery. ACM Transactions on Internet Technology 16, 4 (2016), 22. Google Scholar
Digital Library
- T. Pasquier, J. Singh, J. Powles, et al. 2018. Data provenance to audit compliance with privacy policy in the Internet of Things. Personal and Ubiquitous Computing 22, 2 (2018), 333–344. Google Scholar
Digital Library
- C. Perera, C. McCormick, A. K. Bandara, et al. 2016. Privacy-by-design framework for assessing Internet of Things applications and platforms. In Proceedings of the 6th International Conference on the Internet of Things. ACM, New York, NY, 83–92. Google Scholar
Digital Library
- C. Yin, J. Xi, R. Sun, et al. 2017. Location privacy protection based on differential privacy strategy for big data in Industrial Internet of Things. IEEE Transactions on Industrial Informatics 14, 8 (2017), 3628–3636.Google Scholar
Cross Ref
- L. Xu, N. Shah, L. Chen, et al. 2017. Enabling the sharing economy: Privacy respecting contract based on public blockchain. In Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies,and Contracts. ACM, New York, NY, 15–21. Google Scholar
Digital Library
- J. Shen, T. Zhou, F. Wei, et al. 2017. Privacy-preserving and lightweight key agreement protocol for V2G in the social Internet of Things. IEEE Internet of Things Journal 5, 4 (2017), 2526–2536.Google Scholar
Cross Ref
- K. Gai, K. K. R. Choo, M. Qiu, et al. 2018. Privacy-preserving content-oriented wireless communication in Internet-of-Things. IEEE Internet of Things Journal 5, 4 (2018), 3059–3067.Google Scholar
Cross Ref
- Y. Gong, L. Wei, Y. Guo, et al. 2015. Optimal task recommendation for mobile crowdsourcing with privacy control. IEEE Internet of Things Journal 3, 5 (2015), 745–756.Google Scholar
Cross Ref
- P. Hu, H. Ning, T. Qiu, et al. 2017. Security and privacy preservation scheme of face identification and resolution framework using fog computing in Internet of Things. IEEE Internet of Things Journal 4, 5 (2017), 1143–1155.Google Scholar
Cross Ref
- M. Simsek, A. Aijaz, M. Dohler, et al. 2016. 5G-enabled tactile Internet. IEEE Journal on Selected Areas in Communications 34, 3 (2016), 460–473.Google Scholar
Digital Library
- S. Yu. 2016. Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE Access 4 (2016), 2751–2763.Google Scholar
Cross Ref
- Richard K. Lomotey, Joseph Pry, and Sumanth Sriramoju. 2017. Wearable IoT data stream traceability in a distributed health information system. Pervasive and Mobile Computing 40 (2017), 692--707. Google Scholar
Digital Library
Index Terms
The Security of Medical Data on Internet Based on Differential Privacy Technology
Recommendations
K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data
Wireless Algorithms, Systems, and ApplicationsAbstractRecent years have witnessed the advent of technologies such as the Internet of Things, cloud computing, and big data. Also, the analysis and research of data have attracted more and more attention from researchers. For example, the analysis of ...
Fine-grained k-anonymity for privacy preserving in cloud
Data sensitive information is a crucial concern of every individual. Hospitals lag their trust in privacy to take up the newest technologies of cloud like Information-as-a-service, storage-as-a-service, to deploy their patient’s data for better ...
Utility-based anonymisation for dataset with multiple sensitive attributes
Privacy-preserving data publication problem has attracted more and more attentions in recent years. A lot of related research works have been done towards dataset with single sensitive attribute. However, usually, original dataset contains more than one ...






Comments