skip to main content
research-article

The Security of Medical Data on Internet Based on Differential Privacy Technology

Published:16 June 2021Publication History
Skip Abstract Section

Abstract

The study aims at discussing the security of medical data in the Internet era. By using k-anonymity (K-A) and differential privacy (DP), an algorithm model combining K-A and DP was proposed, which was simulated through the experiments. In the Magic and EIA datasets, the algorithm constructed was compared with K-A and the L-diversity model to verify the performance of the model. The model constructed based on DP had the lowest privacy-leakage risks, which increased with the number of identifiers in the Magic and EIA datasets, and the information disclosure was the least. In addition, in its usability analysis, it was found that its value was the most obviously improved and its operation efficiency was the highest. The K-A-DP algorithm can effectively reduce the risk of privacy leakage and information loss, and has achieved excellent results. Despite the deficiencies in the process of the experiment, the study still provides a reference for solving the problem of medical data security.

References

  1. S. Khozin, C. Weinstock, G. M. Blumenthal, et al. 2017. Osimertinib for the treatment of metastatic EGFR T790M mutation–positive non–small cell lung cancer. Clinical Cancer Research 23, 9 (2017), 2131–2135.Google ScholarGoogle ScholarCross RefCross Ref
  2. J. S. Smolen, M. C. Genovese, T. Takeuchi, et al. 2019. Safety profile of baricitinib in patients with active rheumatoid arthritis with over 2 years median time in treatment. Journal of Rheumatology 46, 1 (2019), 7–18.Google ScholarGoogle ScholarCross RefCross Ref
  3. E. E. K. Wallin, S. Mattsson, and E. M. G. Olsson. 2016. The preference for Internet-based psychological interventions by individuals without past or current use of mental health treatment delivered online: A survey study with mixed-methods analysis. JMIR Mental Health 3, 2 (2016), e25.Google ScholarGoogle ScholarCross RefCross Ref
  4. Y. I. N. Yuehong, Y. Zeng, X. Chen, et al. 2016. The Internet of Things in healthcare: An overview. Journal of Industrial Information Integration 1 (2016), 3–13.Google ScholarGoogle ScholarCross RefCross Ref
  5. J. Chen, F. Fan, J. Y. Wang, et al. 2017. The efficacy and safety of SGLT2 inhibitors for adjunctive treatment of type 1 diabetes: A systematic review and meta-analysis. Scientific Reports 7 (2017), 44128.Google ScholarGoogle ScholarCross RefCross Ref
  6. V. Mazzaferro, B. F. El-Rayes, M. D. dit Busset, et al. 2019. Derazantinib (ARQ 087) in advanced or inoperable FGFR2 gene fusion-positive intrahepatic cholangiocarcinoma. British Journal of Cancer 120, 2 (2019), 165.Google ScholarGoogle ScholarCross RefCross Ref
  7. C. Mathieu, P. Dandona, P. Gillard, et al. 2018. Efficacy and safety of dapagliflozin in patients with inadequately controlled type 1 diabetes (the DEPICT-2 study): 24-week results from a randomized controlled trial. Diabetes Care 41, 9 (2018), 1938–1946.Google ScholarGoogle ScholarCross RefCross Ref
  8. K. Ullah, M. A. Shah, and S. Zhang. 2016. Effective ways to use Internet of Things in the field of medical and smart health care. In Proceedings of the 2016 International Conference on Intelligent Systems Engineering (ICISE’16). IEEE, Los Alamitos, CA, 372–379.Google ScholarGoogle Scholar
  9. J. J. P. C. Rodrigues, D. B. D. R. Segundo, H. A. Junqueira, et al. 2018. Enabling technologies for the Internet of Health Things. IEEE Access 6 (2018), 13129–13141.Google ScholarGoogle ScholarCross RefCross Ref
  10. F. Chen, P. Deng, J. Wan, et al. 2015. Data mining for the Internet of Things: Literature review and challenges. International Journal of Distributed Sensor Networks 11, 8 (2015), 431047. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Borthakur, H. Dubey, N. Constant, et al. 2017. Smart fog: Fog computing framework for unsupervised clustering analytics in wearable Internet of Things. In Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP’17). IEEE, Los Alamitos, CA, 472–476.Google ScholarGoogle ScholarCross RefCross Ref
  12. S. M. R. Islam, D. Kwak, M. D. H. Kabir, et al. 2015. The Internet of Things for health care: A comprehensive survey. IEEE Access 3 (2015), 678–708.Google ScholarGoogle ScholarCross RefCross Ref
  13. J. Jusak, H. Pratikno, and V. H. Putra. 2016. Internet of Medical Things for cardiac monitoring: Paving the way to 5G mobile networks. In Proceedings of the 2016 IEEE International Conference on Communication, Networks, and Satellite (COMNETSAT’16). IEEE, Los Alamitos, CA, 75–79.Google ScholarGoogle Scholar
  14. H. Fouad and H. Farouk. 2017. Heart rate sensor node analysis for designing Internet of Things telemedicine embedded system. Cogent Engineering 4, 1 (2017), 1306152.Google ScholarGoogle ScholarCross RefCross Ref
  15. C. F. Pasluosta, H. Gassner, J. Winkler, et al. 2015. An emerging era in the management of Parkinson's disease: Wearable technologies and the Internet of Things. IEEE Journal of Biomedical and Health Informatics 19, 6 (2015), 1873–1881.Google ScholarGoogle ScholarCross RefCross Ref
  16. M. Spiliopoulou and P. Papapetrou. 2019. Mining and model understanding on medical data. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, New York, NY, 3223–3224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. G. N. Vilaza and J. E. Bardram. 2019. Sharing access to behavioural and personal health data: Designers’ perspectives on opportunities and barriers. In Proceedings of the 13th EAI International Conference on Pervasive Computing Technologies for Healthcare. ACM, New York, NY, 346–350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. Borthakur, H. Dubey, N. Constant, et al. 2017. Smart fog: Fog computing framework for unsupervised clustering analytics in wearable Internet of Things. In Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP’17). IEEE, Los Alamitos, CA, 472–476.Google ScholarGoogle ScholarCross RefCross Ref
  19. J. Milgrom, B. G. Danaher, A. W. Gemmill, et al. 2016. Internet cognitive behavioral therapy for women with postnatal depression: A randomized controlled trial of MumMoodBooster. Journal of Medical Internet Research 18, 3 (2016), e54.Google ScholarGoogle ScholarCross RefCross Ref
  20. D. C. Mohr, K. N. Tomasino, E. G. Lattie, et al. 2017. IntelliCare: An eclectic, skills-based app suite for the treatment of depression and anxiety. Journal of Medical Internet Research 19, 1 (2017), e10.Google ScholarGoogle ScholarCross RefCross Ref
  21. M. Du, K. Wang, Y. Chen, et al. 2018. Big data privacy preserving in multi-access edge computing for heterogeneous internet of things. IEEE Communications Magazine 56, 8 (2018), 62–67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. J. Walker, S. Wedam, L. Amiri-Kordestani, et al. 2016. FDA approval of palbociclib in combination with fulvestrant for the treatment of hormone receptor–positive, HER2-negative metastatic breast cancer. Clinical Cancer Research 22, 20 (2016), 4968–4972.Google ScholarGoogle ScholarCross RefCross Ref
  23. M. Ramachandran and V. Chang. 2016. Towards performance evaluation of cloud service providers for cloud data security. International Journal of Information Management 36, 4 (2016), 618–625. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Q. I. Xia, E. B. Sifah, K. O. Asamoah, et al. 2017. MeDShare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5 (2017), 14757–14767.Google ScholarGoogle ScholarCross RefCross Ref
  25. C. Esposito, A. De Santis, G. Tortora, et al. 2018. Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Computing 5, 1 (2018), 31–37.Google ScholarGoogle ScholarCross RefCross Ref
  26. M. Kantarcioglu and E. Ferrari. 2019. Research challenges at the intersection of big data, security and privacy. Frontiers in Big Data 2, 1 (2019).Google ScholarGoogle Scholar
  27. R. Asija and R. Nallusamy. 2016. Healthcare SaaS based on a data model with built-in security and privacy. International Journal of Cloud Applications and Computing 6, 3 (2016), 1–14.Google ScholarGoogle ScholarCross RefCross Ref
  28. H. A. Al Hamid, S. M. M. Rahman, M. S. Hossain, et al. 2017. A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5 (2017), 22313–22328.Google ScholarGoogle ScholarCross RefCross Ref
  29. K. Abouelmehdi, A. Beni-Hessane, and H. Khaloufi. 2018. Big healthcare data: Preserving security and privacy. Journal of Big Data 5, 1 (2018), 1.Google ScholarGoogle ScholarCross RefCross Ref
  30. S. Pirbhulal, O. W. Samuel, W. Wu, et al. 2019. A joint resource-aware and medical data security framework for wearable healthcare systems. Future Generation Computer Systems 95 (2019), 382–391.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. X. Wan, H. Pei, M. Zhao, et al. 2016. Efficacy and safety of rAAV2-ND4 treatment for Leber's hereditary optic neuropathy. Scientific Reports 6 (2016), 21587.Google ScholarGoogle ScholarCross RefCross Ref
  32. C. H. Lee and H. J. Yoon. 2017. Medical big data: Promise and challenges. Kidney Research and Clinical Practice 36, 1 (2017), 3.Google ScholarGoogle ScholarCross RefCross Ref
  33. J. M. Llibre, C. C. Hung, C. Brinson, et al. 2018. Efficacy, safety, and tolerability of dolutegravir-rilpivirine for the maintenance of virological suppression in adults with HIV-1: Phase 3, randomised, non-inferiority SWORD-1 and SWORD-2 studies. Lancet 391, 10123 (2018), 839–849.Google ScholarGoogle ScholarCross RefCross Ref
  34. K. Singh, K. Drouin, L. P. Newmark, et al. 2016. Developing a framework for evaluating the patient engagement, quality, and safety of mobile health applications. Issue Brief (Commonw Fund) 5, 1 (2016), 11.Google ScholarGoogle Scholar
  35. E. Larkins, G. M. Blumenthal, H. Chen, et al. 2016. FDA approval: Alectinib for the treatment of metastatic, ALK-positive non–small cell lung cancer following crizotinib. Clinical Cancer Research 22, 21 (2016), 5171–5176.Google ScholarGoogle ScholarCross RefCross Ref
  36. M. Sinclair, B. M. Lagan, H. Dolk, et al. 2018. An assessment of pregnant women's knowledge and use of the Internet for medication safety information and purchase. Journal of Advanced Nursing 74, 1 (2018), 137–147.Google ScholarGoogle ScholarCross RefCross Ref
  37. M. Saborowski, M. Dölle, M. P. Manns, et al. 2018. Lipid-lowering therapy with PCSK9-inhibitors in the management of cardiovascular high-risk patients: Effectiveness, therapy adherence and safety in a real world cohort. Cardiology Journal 25, 1 (2018), 32–41.Google ScholarGoogle ScholarCross RefCross Ref
  38. D. Vashishtha, M. L. Mittal, and D. Werb. 2017. The North American opioid epidemic: Current challenges and a call for treatment as prevention. Harm Reduction Journal 14, 1 (2017), 7.Google ScholarGoogle ScholarCross RefCross Ref
  39. J. A. Gosling, P. Batterham, L. Ritterband, et al. 2018. Online insomnia treatment and the reduction of anxiety symptoms as a secondary outcome in a randomised controlled trial: The role of cognitive-behavioural factors. Australian & New Zealand Journal of Psychiatry 52, 12 (2018), 1183–1193.Google ScholarGoogle ScholarCross RefCross Ref
  40. S. M. Fung, C. Sud, and M. Suchodolski. 2019. Survey of customers requesting medical information: Preferences and information needs of patients and health care professionals to support treatment decisions. Therapeutic Innovation & Regulatory Science 6 (2019), 2168479018815455.Google ScholarGoogle ScholarCross RefCross Ref
  41. K. Gai, K. K. R. Choo, M. Qiu, et al. 2018. Privacy-preserving content-oriented wireless communication in Internet-of-Things. IEEE Internet of Things Journal 5, 4 (2018), 3059–3067.Google ScholarGoogle ScholarCross RefCross Ref
  42. J. Lin, W. Yu, N. Zhang, et al. 2017. A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal 4, 5 (2017), 1125–1142.Google ScholarGoogle ScholarCross RefCross Ref
  43. J. J. P. C. Rodrigues, D. B. D. R. Segundo, H. A. Junqueira, et al. 2018. Enabling technologies for the Internet of Health Things. IEEE Access 6 (2018), 13129–13141.Google ScholarGoogle ScholarCross RefCross Ref
  44. Y. Yang, L. Wu, G. Yin, et al. 2017. A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal 4, 5 (2017), 1250–1258.Google ScholarGoogle ScholarCross RefCross Ref
  45. E. Bertino, K. K. R. Choo, D. Georgakopolous, et al. 2016. Internet of things (IoT): Smart and secure service delivery. ACM Transactions on Internet Technology 16, 4 (2016), 22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. T. Pasquier, J. Singh, J. Powles, et al. 2018. Data provenance to audit compliance with privacy policy in the Internet of Things. Personal and Ubiquitous Computing 22, 2 (2018), 333–344. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. C. Perera, C. McCormick, A. K. Bandara, et al. 2016. Privacy-by-design framework for assessing Internet of Things applications and platforms. In Proceedings of the 6th International Conference on the Internet of Things. ACM, New York, NY, 83–92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. C. Yin, J. Xi, R. Sun, et al. 2017. Location privacy protection based on differential privacy strategy for big data in Industrial Internet of Things. IEEE Transactions on Industrial Informatics 14, 8 (2017), 3628–3636.Google ScholarGoogle ScholarCross RefCross Ref
  49. L. Xu, N. Shah, L. Chen, et al. 2017. Enabling the sharing economy: Privacy respecting contract based on public blockchain. In Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies,and Contracts. ACM, New York, NY, 15–21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. J. Shen, T. Zhou, F. Wei, et al. 2017. Privacy-preserving and lightweight key agreement protocol for V2G in the social Internet of Things. IEEE Internet of Things Journal 5, 4 (2017), 2526–2536.Google ScholarGoogle ScholarCross RefCross Ref
  51. K. Gai, K. K. R. Choo, M. Qiu, et al. 2018. Privacy-preserving content-oriented wireless communication in Internet-of-Things. IEEE Internet of Things Journal 5, 4 (2018), 3059–3067.Google ScholarGoogle ScholarCross RefCross Ref
  52. Y. Gong, L. Wei, Y. Guo, et al. 2015. Optimal task recommendation for mobile crowdsourcing with privacy control. IEEE Internet of Things Journal 3, 5 (2015), 745–756.Google ScholarGoogle ScholarCross RefCross Ref
  53. P. Hu, H. Ning, T. Qiu, et al. 2017. Security and privacy preservation scheme of face identification and resolution framework using fog computing in Internet of Things. IEEE Internet of Things Journal 4, 5 (2017), 1143–1155.Google ScholarGoogle ScholarCross RefCross Ref
  54. M. Simsek, A. Aijaz, M. Dohler, et al. 2016. 5G-enabled tactile Internet. IEEE Journal on Selected Areas in Communications 34, 3 (2016), 460–473.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. S. Yu. 2016. Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE Access 4 (2016), 2751–2763.Google ScholarGoogle ScholarCross RefCross Ref
  56. Richard K. Lomotey, Joseph Pry, and Sumanth Sriramoju. 2017. Wearable IoT data stream traceability in a distributed health information system. Pervasive and Mobile Computing 40 (2017), 692--707. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The Security of Medical Data on Internet Based on Differential Privacy Technology

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 21, Issue 3
      August 2021
      522 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3468071
      • Editor:
      • Ling Liu
      Issue’s Table of Contents

      Copyright © 2021 Association for Computing Machinery.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 June 2021
      • Online AM: 7 May 2020
      • Accepted: 1 February 2020
      • Revised: 1 January 2020
      • Received: 1 November 2019
      Published in toit Volume 21, Issue 3

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!